The MITRE CVE dictionary describes this issue as:
stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM authentication are enabled, does not correctly perform integer conversion, which allows remote proxy servers to execute arbitrary code via a crafted request that triggers a buffer overflow.
Find out more about CVE-2013-1762 from the
MITRE CVE dictionary dictionary and
This issue did not affect the version of the stunnel package as shipped with Red Hat Enterprise Linux 5.