[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[linux-security] stunnel format bug



First: I forgot to include [linux-security] in the subject line of the
  gnupg advisory. I hope that not too many of you hit the delete key on
  the message because of that omission. If you did:
Second: linux-security is now archived at
  http://www.sfu.ca/~siegert/linux-security
  For now the archive only shows the latest advisories. If I find a way (and
  the time) to include earlier advisories in the database, I'll do that some
  time in the future.
Third: stunnel advisory:

Topic
=====
stunnel contains a format bug that can lead to a local root exploit.

Problem Description
===================
The stunnel program is designed to work as SSL encryption wrapper between
remote clients and local (inetd-startable) or remote servers. The concept
is that having non-SSL aware daemons running on your system you can easily
set them up to communicate with clients over secure SSL channels.

Stunnel version 3.8 (and earlier) contains a format-string
vulnerability.  Version 3.9 closes this vulnerability.

Affected Systems
================
All systems that have stunnel installed with version < 3.9
(I only know of RH 7.0 that has this installed by default).

Solution
========
Update stunnel to version 3.9 or later (newest version is 3.11).

RedHat 7.0
rpm -Fvh stunnel-3.9-1.i386.rpm