Security vulnerability in stunnel versions 4.21 - 4.54

Bug #1150150 reported by Jonathon Walz
260
This bug affects 1 person
Affects Status Importance Assigned to Milestone
stunnel4 (Debian)
Fix Released
Unknown
stunnel4 (Ubuntu)
Fix Released
Undecided
Unassigned
Precise
Fix Released
Undecided
Unassigned
Quantal
Fix Released
Undecided
Unassigned
Saucy
Fix Released
Undecided
Unassigned

Bug Description

A security vulnerability exists in stunnel versions 4.21 - 4.54 that use NTML authentication: https://www.stunnel.org/CVE-2013-1762.html

1) I'm using Ubuntu 12.04.2 LTS but it's present in raring as well
2) 3:4.42-1

Revision history for this message
Seth Arnold (seth-arnold) wrote :

Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest coordinating with upstream and posting a debdiff for this issue. When a debdiff is available, members of the security team will review it and publish the package. See the following link for more information: https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures

Changed in stunnel4 (Ubuntu):
status: New → Incomplete
information type: Private Security → Public Security
Changed in stunnel4 (Debian):
status: Unknown → Fix Released
Changed in stunnel4 (Ubuntu Saucy):
status: New → Fix Released
Changed in stunnel4 (Ubuntu Precise):
status: New → Confirmed
Changed in stunnel4 (Ubuntu Quantal):
status: New → Confirmed
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package stunnel4 - 3:4.53-1ubuntu0.1

---------------
stunnel4 (3:4.53-1ubuntu0.1) quantal-security; urgency=medium

  * SECURITY UPDATE: arbitrary code execution via NTLM auth (LP: #1150150)
    - debian/patches/CVE-2013-1762.patch: properly handle length in
      src/protocol.c.
    - CVE-2013-1762
 -- Marc Deslauriers <email address hidden> Tue, 28 Jan 2014 07:42:48 -0500

Changed in stunnel4 (Ubuntu Quantal):
status: Confirmed → Fix Released
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package stunnel4 - 3:4.42-1ubuntu0.1

---------------
stunnel4 (3:4.42-1ubuntu0.1) precise-security; urgency=medium

  * SECURITY UPDATE: arbitrary code execution via NTLM auth (LP: #1150150)
    - debian/patches/CVE-2013-1762.patch: properly handle length in
      src/protocol.c.
    - CVE-2013-1762
 -- Marc Deslauriers <email address hidden> Tue, 28 Jan 2014 07:47:59 -0500

Changed in stunnel4 (Ubuntu Precise):
status: Confirmed → Fix Released
Revision history for this message
Steve Beattie (sbeattie) wrote :

This was fixed in stunnel4 3:4.53-1.1ubuntu1 in trusty and all subsequent releases, marking closed.

Changed in stunnel4 (Ubuntu):
status: Incomplete → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.