CVE-2015-3644

EUVD-2015-3682
Stunnel 5.00 through 5.13, when using the redirect option, does not redirect client connections to the expected server after the initial connection, which allows remote attackers to bypass authentication.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 47%
Affected Products (NVD)
VendorProductVersion
stunnelstunnel
5.00
stunnelstunnel
5.01
stunnelstunnel
5.02
stunnelstunnel
5.03
stunnelstunnel
5.04
stunnelstunnel
5.05
stunnelstunnel
5.06
stunnelstunnel
5.07
stunnelstunnel
5.08
stunnelstunnel
5.09
stunnelstunnel
5.10
stunnelstunnel
5.11
stunnelstunnel
5.12
stunnelstunnel
5.13
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
stunnel4
bookworm
3:5.68-2+deb12u1
fixed
bullseye
3:5.56+dfsg-10
fixed
sid
3:5.73-1
fixed
squeeze
not-affected
trixie
3:5.73-1
fixed
wheezy
not-affected
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
stunnel4
artful
not-affected
bionic
not-affected
cosmic
not-affected
precise
ignored
trusty
not-affected
utopic
ignored
vivid
Fixed 3:5.06-2+deb8u1build0.15.04.1
released
wily
not-affected
xenial
not-affected
yakkety
not-affected
zesty
not-affected