CVE-2015-3644

NameCVE-2015-3644
DescriptionStunnel 5.00 through 5.13, when using the redirect option, does not redirect client connections to the expected server after the initial connection, which allows remote attackers to bypass authentication.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-3299-1
Debian Bugs785352

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
stunnel4 (PTS)buster3:5.50-3fixed
bullseye3:5.56+dfsg-10fixed
bookworm3:5.68-2+deb12u1fixed
trixie3:5.72-1fixed
sid3:5.72-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
stunnel4sourcesqueeze(not affected)
stunnel4sourcewheezy(not affected)
stunnel4sourcejessie3:5.06-2+deb8u1DSA-3299-1
stunnel4source(unstable)3:5.18-1785352

Notes

[wheezy] - stunnel4 <not-affected> (Affects 5.00 through 5.13 with specfic configurations)
[squeeze] - stunnel4 <not-affected> (Affects 5.00 through 5.13 with specfic configurations)
https://www.stunnel.org/CVE-2015-3644.html

Search for package or bug name: Reporting problems