Vulnerabilities > CVE-2002-0002
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Format string vulnerability in stunnel before 3.22 when used in client mode for (1) smtp, (2) pop, or (3) nntp allows remote malicious servers to execute arbitrary code.
Vulnerable Configurations
Exploit-Db
description | STunnel 3.x Client Negotiation Protocol Format String Vulnerability. CVE-2002-0002. Remote exploit for linux platform |
id | EDB-ID:21192 |
last seen | 2016-02-02 |
modified | 2001-12-22 |
published | 2001-12-22 |
reporter | deltha |
source | https://www.exploit-db.com/download/21192/ |
title | STunnel 3.x Client Negotiation Protocol Format String Vulnerability |
Nessus
NASL family | Mandriva Local Security Checks |
NASL id | MANDRAKE_MDKSA-2002-004.NASL |
description | All versions of stunnel from 3.15 to 3.21c are vulnerable to format string bugs in the functions which implement smtp, pop, and nntp client negotiations. Using stunnel with the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 13912 |
published | 2004-07-31 |
reporter | This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/13912 |
title | Mandrake Linux Security Advisory : stunnel (MDKSA-2002:004) |
code |
|
Redhat
advisories |
|
References
- http://marc.info/?l=stunnel-users&m=100869449828705&w=2
- http://online.securityfocus.com/archive/1/247427
- http://online.securityfocus.com/archive/1/248149
- http://stunnel.mirt.net/news.html
- http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-004.php3
- http://www.redhat.com/support/errata/RHSA-2002-002.html
- http://www.securityfocus.com/bid/3748
- https://exchange.xforce.ibmcloud.com/vulnerabilities/7741