stunnel 4.21 through 4.54, when CONNECT protocol...
Moderate severity
Unreviewed
Published
May 17, 2022
to the GitHub Advisory Database
•
Updated Jan 28, 2023
Description
Published by the National Vulnerability Database
Mar 8, 2013
Published to the GitHub Advisory Database
May 17, 2022
Last updated
Jan 28, 2023
stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM authentication are enabled, does not correctly perform integer conversion, which allows remote proxy servers to execute arbitrary code via a crafted request that triggers a buffer overflow.
References