CVE-2002-0002

Current Description

Format string vulnerability in stunnel before 3.22 when used in client mode for (1) smtp, (2) pop, or (3) nntp allows remote malicious servers to execute arbitrary code.

Basic Data

PublishedJanuary 31, 2002
Last ModifiedOctober 10, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score7.5
SeverityHIGH
Exploitability Score10.0
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegetrue
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationStunnelStunnel3.3*******
    2.3ApplicationStunnelStunnel3.4a*******
    2.3ApplicationStunnelStunnel3.7*******
    2.3ApplicationStunnelStunnel3.8*******
    2.3ApplicationStunnelStunnel3.9*******
    2.3ApplicationStunnelStunnel3.10*******
    2.3ApplicationStunnelStunnel3.11*******
    2.3ApplicationStunnelStunnel3.12*******
    2.3ApplicationStunnelStunnel3.13*******
    2.3ApplicationStunnelStunnel3.14*******
    2.3ApplicationStunnelStunnel3.15*******
    2.3ApplicationStunnelStunnel3.16*******
    2.3ApplicationStunnelStunnel3.17*******
    2.3ApplicationStunnelStunnel3.18*******
    2.3ApplicationStunnelStunnel3.19*******
    2.3ApplicationStunnelStunnel3.20*******
    2.3ApplicationStunnelStunnel3.21*******
    2.3ApplicationStunnelStunnel3.21a*******
    2.3ApplicationStunnelStunnel3.21b*******
    2.3ApplicationStunnelStunnel3.21c*******
    2.3ApplicationStunnelStunnel3.22*******
    2.3ApplicationStunnelStunnel3.24*******
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSEngardelinuxSecure Linux1.0.1*******
    2.3OSMandrakesoftMandrake Linux8.1*******
    2.3OSRedhatLinux7.2*******

Vulnerable Software List

VendorProductVersions
Engardelinux Secure Linux 1.0.1
Redhat Linux 7.2
Stunnel Stunnel 3.10, 3.11, 3.12, 3.13, 3.14, 3.15, 3.16, 3.17, 3.18, 3.19, 3.20, 3.21, 3.21a, 3.21b, 3.21c, 3.22, 3.24, 3.3, 3.4a, 3.7, 3.8, 3.9
Mandrakesoft Mandrake Linux 8.1

References

NameSourceURLTags
http://marc.info/?l=stunnel-users&m=100869449828705&w=2http://marc.info/?l=stunnel-users&m=100869449828705&w=2MISC
20011227 Stunnel: Format String Bug in versions <3.22http://online.securityfocus.com/archive/1/247427BUGTRAQ
20020102 Stunnel: Format String Bug updatehttp://online.securityfocus.com/archive/1/248149BUGTRAQ
http://stunnel.mirt.net/news.htmlhttp://stunnel.mirt.net/news.htmlCONFIRMVendor Advisory
MDKSA-2002:004http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-004.php3MANDRAKE
RHSA-2002:002http://www.redhat.com/support/errata/RHSA-2002-002.htmlREDHATPatch Vendor Advisory
3748http://www.securityfocus.com/bid/3748BID
stunnel-client-format-string(7741)https://exchange.xforce.ibmcloud.com/vulnerabilities/7741XF