Vulnerabilities > CVE-2002-1563 - SIGCHLD Signal Handler vulnerability in Stunnel 4.04
Attack vector
LOCAL Attack complexity
HIGH Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
PARTIAL Summary
stunnel 4.0.3 and earlier allows attackers to cause a denial of service (crash) via SIGCHLD signal handler race conditions that cause an inconsistency in the child counter.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | Red Hat Local Security Checks |
NASL id | REDHAT-RHSA-2003-223.NASL |
description | Updated stunnel packages are now available. These updates correct a potential vulnerability in stunnel |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 12406 |
published | 2004-07-06 |
reporter | This script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/12406 |
title | RHEL 2.1 : stunnel (RHSA-2003:223) |
Redhat
advisories |
|
References
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000736
- http://marc.info/?l=bugtraq&m=104247606910598
- http://marc.info/?l=bugtraq&m=106029168514511&w=2
- http://marc.info/?l=stunnel-users&m=103600188215117&w=2
- http://www.linuxsecurity.com/advisories/engarde_advisory-3535.html
- http://www.redhat.com/support/errata/RHSA-2003-221.html
- http://www.redhat.com/support/errata/RHSA-2003-223.html
- http://www.securityfocus.com/bid/6592