LWN.net Logo

Mageia alert MGASA-2013-0097 (stunnel)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2013-0097: stunnel-4.55-1.mga2 (2/core)
Date:  Sat, 16 Mar 2013 23:38:08 +0100
Message-ID:  <20130316223808.GA14220@valstar.mageia.org>
Archive-link:  Article, Thread

MGASA-2013-0097 Date: March 16rd, 2013 Affected releases: 2 Media: Core Description: Updated stunnel packages fix security vulnerability: stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM authentication are enabled, does not correctly perform integer conversion, which allows remote proxy servers to execute arbitrary code via a crafted request that triggers a buffer overflow (CVE-2013-1762). Updated Packages: i586: stunnel-4.55-1.mga2.i586.rpm stunnel-debug-4.55-1.mga2.i586.rpm x86_64: stunnel-4.55-1.mga2.x86_64.rpm stunnel-debug-4.55-1.mga2.x86_64.rpm SRPMS: stunnel-4.55-1.mga2.src.rpm References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1762 https://www.stunnel.org/CVE-2013-1762.html https://bugs.mageia.org/show_bug.cgi?id=9312 https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-...


(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds