Upstream information

CVE-2015-3644 at MITRE

Description

Stunnel 5.00 through 5.13, when using the redirect option, does not redirect client connections to the expected server after the initial connection, which allows remote attackers to bypass authentication.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database SUSE
Base Score 5.8 6.4
Vector AV:N/AC:M/Au:N/C:P/I:P/A:N AV:N/AC:L/Au:N/C:P/I:P/A:N
Access Vector Network Network
Access Complexity Medium Low
Authentication None None
Confidentiality Impact Partial Partial
Integrity Impact Partial Partial
Availability Impact None None
SUSE Bugzilla entries: 1177580 [RESOLVED / FIXED], 931517 [RESOLVED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise High Performance Computing 12 SP5
SUSE Linux Enterprise Server 12 SP4
SUSE Linux Enterprise Server 12 SP5
  • stunnel >= 5.00-4.3.4
SUSE Linux Enterprise Server 12 SP1
SUSE Linux Enterprise Server 12 SP2
SUSE Linux Enterprise Server 12 SP3
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2
  • stunnel >= 5.00-3.1
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Server for SAP Applications 12
  • stunnel >= 5.00-3.1
Patchnames:
SUSE-SLE-SERVER-12-2015-268


Status of this issue by product and package

Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.

Product(s) Source package State
HPE Helion OpenStack 8 stunnel Released
SUSE Enterprise Storage 5 stunnel Released
SUSE Linux Enterprise High Performance Computing 12 SP5 stunnel Released
SUSE Linux Enterprise Point of Service Image Server 12 stunnel Released
SUSE Linux Enterprise Server 11 SP3 stunnel Not affected
SUSE Linux Enterprise Server 11 SP3 for VMware stunnel Not affected
SUSE Linux Enterprise Server 12 stunnel Released
SUSE Linux Enterprise Server 12 SP1 stunnel Released
SUSE Linux Enterprise Server 12 SP2 BCL stunnel Released
SUSE Linux Enterprise Server 12 SP2 ESPOS stunnel Released
SUSE Linux Enterprise Server 12 SP2 LTSS stunnel Released
SUSE Linux Enterprise Server 12 SP2 LTSS ERICSSON stunnel Released
SUSE Linux Enterprise Server 12 SP2 LTSS SAP stunnel Released
SUSE Linux Enterprise Server 12 SP3 BCL stunnel Released
SUSE Linux Enterprise Server 12 SP3 ESPOS stunnel Released
SUSE Linux Enterprise Server 12 SP3 LTSS stunnel Released
SUSE Linux Enterprise Server 12 SP4 ESPOS stunnel Released
SUSE Linux Enterprise Server 12 SP4 LTSS stunnel Released
SUSE Linux Enterprise Server 12 SP5 stunnel Released
SUSE Linux Enterprise Server for SAP Applications 12 SP2 stunnel Released
SUSE Linux Enterprise Server for SAP Applications 12 SP3 stunnel Released
SUSE Linux Enterprise Server for SAP Applications 12 SP4 stunnel Released
SUSE Linux Enterprise Server for SAP Applications 12 SP5 stunnel Released
SUSE OpenStack Cloud 7 stunnel Released
SUSE OpenStack Cloud 8 stunnel Released
SUSE OpenStack Cloud 9 stunnel Released
SUSE OpenStack Cloud Crowbar 8 stunnel Released
SUSE OpenStack Cloud Crowbar 9 stunnel Released