Debian Security Advisory

DSA-009-1 stunnel -- insecure file handling, format string bug

Date Reported:
25 Dec 2000
Affected Packages:
stunnel
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2001-0060.
More information:
Lez discovered a format string problem in stunnel (a tool to create universal SSL tunnel for other network daemons). Brian Hatch responded by stating he was already preparing a new release with multiple security fixes:
  1. The PRNG (pseudo-random generated) was not seeded correctly. This only affects operation on operating systems without a secure random generator (like Linux).
  2. Pid files were not created securely, making stunnel vulnerable to a symlink attack.
  3. There was an insecure syslog() call which could be exploited if the user could manage to insert text into the logged text. At least one way to exploit this using faked identd responses was demonstrated by Lez.

These problems have been fixed in version 3.10-0potato1.

Fixed in:

Debian 2.2 (potato)

Source:
http://security.debian.org/dists/stable/updates/main/source/stunnel_3.10-0potato1.diff.gz
http://security.debian.org/dists/stable/updates/main/source/stunnel_3.10-0potato1.dsc
http://security.debian.org/dists/stable/updates/main/source/stunnel_3.10.orig.tar.gz
alpha:
http://security.debian.org/dists/stable/updates/main/binary-alpha/stunnel_3.10-0potato1_alpha.deb
arm:
http://security.debian.org/dists/stable/updates/main/binary-arm/stunnel_3.10-0potato1_arm.deb
i386:
http://security.debian.org/dists/stable/updates/main/binary-i386/stunnel_3.10-0potato1_i386.deb
m68k:
http://security.debian.org/dists/stable/updates/main/binary-m68k/stunnel_3.10-0potato1_m68k.deb
powerpc:
http://security.debian.org/dists/stable/updates/main/binary-powerpc/stunnel_3.10-0potato1_powerpc.deb
sparc:
http://security.debian.org/dists/stable/updates/main/binary-sparc/stunnel_3.10-0potato1_sparc.deb