CVE-2013-1762

stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM authentication are enabled, does not correctly perform integer conversion, which allows remote proxy servers to execute arbitrary code via a crafted request that triggers a buffer overflow.
Code Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.6 UNKNOWN
NETWORK
HIGH
AV:N/AC:H/Au:N/C:P/I:P/A:C
Base Score
CVSS 3.x
EPSS Score
Percentile: 83%
Affected Products (NVD)
VendorProductVersion
stunnelstunnel
𝑥
≤ 4.54
stunnelstunnel
4.21
stunnelstunnel
4.22
stunnelstunnel
4.23
stunnelstunnel
4.24
stunnelstunnel
4.25
stunnelstunnel
4.26
stunnelstunnel
4.27
stunnelstunnel
4.28
stunnelstunnel
4.29
stunnelstunnel
4.30
stunnelstunnel
4.31
stunnelstunnel
4.32
stunnelstunnel
4.33
stunnelstunnel
4.34
stunnelstunnel
4.35
stunnelstunnel
4.36
stunnelstunnel
4.37
stunnelstunnel
4.38
stunnelstunnel
4.39
stunnelstunnel
4.40
stunnelstunnel
4.41
stunnelstunnel
4.42
stunnelstunnel
4.43
stunnelstunnel
4.44
stunnelstunnel
4.45
stunnelstunnel
4.46
stunnelstunnel
4.47
stunnelstunnel
4.48
stunnelstunnel
4.49
stunnelstunnel
4.50
stunnelstunnel
4.51
stunnelstunnel
4.52
stunnelstunnel
4.53
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
stunnel4
bookworm
3:5.68-2+deb12u1
fixed
bullseye
3:5.56+dfsg-10
fixed
sid
3:5.73-1
fixed
trixie
3:5.73-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
stunnel4
hardy
ignored
lucid
Fixed 3:4.29-1+squeeze1build0.10.04.1
released
oneiric
ignored
precise
Fixed 3:4.42-1ubuntu0.1
released
quantal
Fixed 3:4.53-1ubuntu0.1
released
raring
ignored
saucy
not-affected
Red Hat logo
Red Hat Enterprise Linux Releases
Red Hat Product
Release
stunnel
RHEL 6
0:4.29-3.el6_4
fixed