ID CVE-2002-0002
Summary Format string vulnerability in stunnel before 3.22 when used in client mode for (1) smtp, (2) pop, or (3) nntp allows remote malicious servers to execute arbitrary code.
References
Vulnerable Configurations
  • cpe:2.3:a:stunnel:stunnel:3.3:*:*:*:*:*:*:*
    cpe:2.3:a:stunnel:stunnel:3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:stunnel:stunnel:3.4a:*:*:*:*:*:*:*
    cpe:2.3:a:stunnel:stunnel:3.4a:*:*:*:*:*:*:*
  • cpe:2.3:a:stunnel:stunnel:3.7:*:*:*:*:*:*:*
    cpe:2.3:a:stunnel:stunnel:3.7:*:*:*:*:*:*:*
  • cpe:2.3:a:stunnel:stunnel:3.8:*:*:*:*:*:*:*
    cpe:2.3:a:stunnel:stunnel:3.8:*:*:*:*:*:*:*
  • cpe:2.3:a:stunnel:stunnel:3.9:*:*:*:*:*:*:*
    cpe:2.3:a:stunnel:stunnel:3.9:*:*:*:*:*:*:*
  • cpe:2.3:a:stunnel:stunnel:3.10:*:*:*:*:*:*:*
    cpe:2.3:a:stunnel:stunnel:3.10:*:*:*:*:*:*:*
  • cpe:2.3:a:stunnel:stunnel:3.11:*:*:*:*:*:*:*
    cpe:2.3:a:stunnel:stunnel:3.11:*:*:*:*:*:*:*
  • cpe:2.3:a:stunnel:stunnel:3.12:*:*:*:*:*:*:*
    cpe:2.3:a:stunnel:stunnel:3.12:*:*:*:*:*:*:*
  • cpe:2.3:a:stunnel:stunnel:3.13:*:*:*:*:*:*:*
    cpe:2.3:a:stunnel:stunnel:3.13:*:*:*:*:*:*:*
  • cpe:2.3:a:stunnel:stunnel:3.14:*:*:*:*:*:*:*
    cpe:2.3:a:stunnel:stunnel:3.14:*:*:*:*:*:*:*
  • cpe:2.3:a:stunnel:stunnel:3.15:*:*:*:*:*:*:*
    cpe:2.3:a:stunnel:stunnel:3.15:*:*:*:*:*:*:*
  • cpe:2.3:a:stunnel:stunnel:3.16:*:*:*:*:*:*:*
    cpe:2.3:a:stunnel:stunnel:3.16:*:*:*:*:*:*:*
  • cpe:2.3:a:stunnel:stunnel:3.17:*:*:*:*:*:*:*
    cpe:2.3:a:stunnel:stunnel:3.17:*:*:*:*:*:*:*
  • cpe:2.3:a:stunnel:stunnel:3.18:*:*:*:*:*:*:*
    cpe:2.3:a:stunnel:stunnel:3.18:*:*:*:*:*:*:*
  • cpe:2.3:a:stunnel:stunnel:3.19:*:*:*:*:*:*:*
    cpe:2.3:a:stunnel:stunnel:3.19:*:*:*:*:*:*:*
  • cpe:2.3:a:stunnel:stunnel:3.20:*:*:*:*:*:*:*
    cpe:2.3:a:stunnel:stunnel:3.20:*:*:*:*:*:*:*
  • cpe:2.3:a:stunnel:stunnel:3.21:*:*:*:*:*:*:*
    cpe:2.3:a:stunnel:stunnel:3.21:*:*:*:*:*:*:*
  • cpe:2.3:a:stunnel:stunnel:3.21a:*:*:*:*:*:*:*
    cpe:2.3:a:stunnel:stunnel:3.21a:*:*:*:*:*:*:*
  • cpe:2.3:a:stunnel:stunnel:3.21b:*:*:*:*:*:*:*
    cpe:2.3:a:stunnel:stunnel:3.21b:*:*:*:*:*:*:*
  • cpe:2.3:a:stunnel:stunnel:3.21c:*:*:*:*:*:*:*
    cpe:2.3:a:stunnel:stunnel:3.21c:*:*:*:*:*:*:*
  • cpe:2.3:a:stunnel:stunnel:3.22:*:*:*:*:*:*:*
    cpe:2.3:a:stunnel:stunnel:3.22:*:*:*:*:*:*:*
  • cpe:2.3:a:stunnel:stunnel:3.24:*:*:*:*:*:*:*
    cpe:2.3:a:stunnel:stunnel:3.24:*:*:*:*:*:*:*
  • cpe:2.3:o:engardelinux:secure_linux:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:o:engardelinux:secure_linux:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:o:mandrakesoft:mandrake_linux:8.1:*:*:*:*:*:*:*
    cpe:2.3:o:mandrakesoft:mandrake_linux:8.1:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:linux:7.2:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:linux:7.2:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 10-10-2017 - 01:30)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
redhat via4
advisories
rhsa
id RHSA-2002:002
refmap via4
bid 3748
bugtraq
  • 20011227 Stunnel: Format String Bug in versions <3.22
  • 20020102 Stunnel: Format String Bug update
confirm http://stunnel.mirt.net/news.html
mandrake MDKSA-2002:004
misc http://marc.info/?l=stunnel-users&m=100869449828705&w=2
xf stunnel-client-format-string(7741)
Last major update 10-10-2017 - 01:30
Published 31-01-2002 - 05:00
Last modified 10-10-2017 - 01:30
Back to Top