CVE-2015-3644

Stunnel 5.00 through 5.13, when using the redirect option, does not redirect client connections to the expected server after the initial connection, which allows remote attackers to bypass authentication.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:N
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 48%
VendorProductVersion
stunnelstunnel
5.00
stunnelstunnel
5.01
stunnelstunnel
5.02
stunnelstunnel
5.03
stunnelstunnel
5.04
stunnelstunnel
5.05
stunnelstunnel
5.06
stunnelstunnel
5.07
stunnelstunnel
5.08
stunnelstunnel
5.09
stunnelstunnel
5.10
stunnelstunnel
5.11
stunnelstunnel
5.12
stunnelstunnel
5.13
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
stunnel4
bullseye
3:5.56+dfsg-10
fixed
wheezy
not-affected
squeeze
not-affected
bookworm
3:5.68-2+deb12u1
fixed
sid
3:5.73-1
fixed
trixie
3:5.73-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
stunnel4
cosmic
not-affected
bionic
not-affected
artful
not-affected
zesty
not-affected
yakkety
not-affected
xenial
not-affected
wily
not-affected
vivid
Fixed 3:5.06-2+deb8u1build0.15.04.1
released
utopic
ignored
trusty
not-affected
precise
ignored