CVE-2013-1762

stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM authentication are enabled, does not correctly perform integer conversion, which allows remote proxy servers to execute arbitrary code via a crafted request that triggers a buffer overflow.
Code Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.6 UNKNOWN
NETWORK
HIGH
AV:N/AC:H/Au:N/C:P/I:P/A:C
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 82%
VendorProductVersion
stunnelstunnel
𝑥
≤ 4.54
stunnelstunnel
4.21
stunnelstunnel
4.22
stunnelstunnel
4.23
stunnelstunnel
4.24
stunnelstunnel
4.25
stunnelstunnel
4.26
stunnelstunnel
4.27
stunnelstunnel
4.28
stunnelstunnel
4.29
stunnelstunnel
4.30
stunnelstunnel
4.31
stunnelstunnel
4.32
stunnelstunnel
4.33
stunnelstunnel
4.34
stunnelstunnel
4.35
stunnelstunnel
4.36
stunnelstunnel
4.37
stunnelstunnel
4.38
stunnelstunnel
4.39
stunnelstunnel
4.40
stunnelstunnel
4.41
stunnelstunnel
4.42
stunnelstunnel
4.43
stunnelstunnel
4.44
stunnelstunnel
4.45
stunnelstunnel
4.46
stunnelstunnel
4.47
stunnelstunnel
4.48
stunnelstunnel
4.49
stunnelstunnel
4.50
stunnelstunnel
4.51
stunnelstunnel
4.52
stunnelstunnel
4.53
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
stunnel4
bullseye
3:5.56+dfsg-10
fixed
bookworm
3:5.68-2+deb12u1
fixed
sid
3:5.73-1
fixed
trixie
3:5.73-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
stunnel4
saucy
not-affected
raring
ignored
quantal
Fixed 3:4.53-1ubuntu0.1
released
precise
Fixed 3:4.42-1ubuntu0.1
released
oneiric
ignored
lucid
Fixed 3:4.29-1+squeeze1build0.10.04.1
released
hardy
ignored