[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[linux-security] stunnel format bug
- To: linux-security
- Subject: [linux-security] stunnel format bug
- From: Martin Siegert <siegert@sfu.ca>
- Date: Thu, 21 Dec 2000 14:59:22 -0800
- User-Agent: Mutt/1.2i
First: I forgot to include [linux-security] in the subject line of the
gnupg advisory. I hope that not too many of you hit the delete key on
the message because of that omission. If you did:
Second: linux-security is now archived at
http://www.sfu.ca/~siegert/linux-security
For now the archive only shows the latest advisories. If I find a way (and
the time) to include earlier advisories in the database, I'll do that some
time in the future.
Third: stunnel advisory:
Topic
=====
stunnel contains a format bug that can lead to a local root exploit.
Problem Description
===================
The stunnel program is designed to work as SSL encryption wrapper between
remote clients and local (inetd-startable) or remote servers. The concept
is that having non-SSL aware daemons running on your system you can easily
set them up to communicate with clients over secure SSL channels.
Stunnel version 3.8 (and earlier) contains a format-string
vulnerability. Version 3.9 closes this vulnerability.
Affected Systems
================
All systems that have stunnel installed with version < 3.9
(I only know of RH 7.0 that has this installed by default).
Solution
========
Update stunnel to version 3.9 or later (newest version is 3.11).
RedHat 7.0
rpm -Fvh stunnel-3.9-1.i386.rpm