Debian Security Advisory
DSA-009-1 stunnel -- insecure file handling, format string bug
- Date Reported:
- 25 Dec 2000
- Affected Packages:
- stunnel
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2001-0060.
- More information:
- Lez discovered a format string problem in stunnel (a tool
to create universal SSL tunnel for other network daemons). Brian Hatch
responded by stating he was already preparing a new release with multiple
security fixes:
- The PRNG (pseudo-random generated) was not seeded correctly. This only affects operation on operating systems without a secure random generator (like Linux).
- Pid files were not created securely, making stunnel vulnerable to a symlink attack.
- There was an insecure syslog() call which could be exploited if the user could manage to insert text into the logged text. At least one way to exploit this using faked identd responses was demonstrated by Lez.
These problems have been fixed in version 3.10-0potato1.
- Fixed in:
-
Debian 2.2 (potato)
- Source:
-
http://security.debian.org/dists/stable/updates/main/source/stunnel_3.10-0potato1.diff.gz
-
http://security.debian.org/dists/stable/updates/main/source/stunnel_3.10-0potato1.dsc
-
http://security.debian.org/dists/stable/updates/main/source/stunnel_3.10.orig.tar.gz
- alpha:
-
http://security.debian.org/dists/stable/updates/main/binary-alpha/stunnel_3.10-0potato1_alpha.deb
- arm:
-
http://security.debian.org/dists/stable/updates/main/binary-arm/stunnel_3.10-0potato1_arm.deb
- i386:
-
http://security.debian.org/dists/stable/updates/main/binary-i386/stunnel_3.10-0potato1_i386.deb
- m68k:
-
http://security.debian.org/dists/stable/updates/main/binary-m68k/stunnel_3.10-0potato1_m68k.deb
- powerpc:
-
http://security.debian.org/dists/stable/updates/main/binary-powerpc/stunnel_3.10-0potato1_powerpc.deb
- sparc:
-
http://security.debian.org/dists/stable/updates/main/binary-sparc/stunnel_3.10-0potato1_sparc.deb