Public Date:
917839: CVE-2013-1762 Stunnel: buffer overflow vulnerability due to incorrect integer conversion in the NTLM authentication of the CONNECT protocol negotiation

The MITRE CVE dictionary describes this issue as:

stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM authentication are enabled, does not correctly perform integer conversion, which allows remote proxy servers to execute arbitrary code via a crafted request that triggers a buffer overflow.

Find out more about CVE-2013-1762 from the MITRE CVE dictionary dictionary and NIST NVD.


This issue did not affect the version of the stunnel package as shipped with Red Hat Enterprise Linux 5.

CVSS v2 metrics

NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.

Base Score 5.1
Base Metrics AV:N/AC:H/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity High
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux version 6 (stunnel) RHSA-2013:0714 2013-04-08

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 5 stunnel Not affected

External References