Skip to navigation

Security Advisory Moderate: stunnel security update

Advisory: RHSA-2013:0714-1
Type: Security Advisory
Severity: Moderate
Issued on: 2013-04-08
Last updated on: 2013-04-08
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server AUS (v. 6.4)
Red Hat Enterprise Linux Server EUS (v. 6.4.z)
Red Hat Enterprise Linux Workstation (v. 6)
CVEs (cve.mitre.org): CVE-2013-1762

Details

An updated stunnel package that fixes one security issue is now available
for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

stunnel is a socket wrapper which can provide SSL (Secure Sockets Layer)
support to ordinary applications. For example, it can be used in
conjunction with imapd to create an SSL-secure IMAP server.

An integer conversion issue was found in stunnel when using Microsoft NT
LAN Manager (NTLM) authentication with the HTTP CONNECT tunneling method.
With this configuration, and using stunnel in SSL client mode on a 64-bit
system, an attacker could possibly execute arbitrary code with the
privileges of the stunnel process via a man-in-the-middle attack or by
tricking a user into using a malicious proxy. (CVE-2013-1762)

All stunnel users should upgrade to this updated package, which contains a
backported patch to correct this issue.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
stunnel-4.29-3.el6_4.src.rpm     MD5: 57265c1df179e2ebd1ef8f06962f0c66
SHA-256: 5945acd3e414303d9086a7b35d92d84b78863752f3f518bb821eacce5796c50f
 
IA-32:
stunnel-4.29-3.el6_4.i686.rpm     MD5: 5e7dddb1802239b9b956915aafdc77d9
SHA-256: d43ea5796930a648c544475b02b4e06ea6b3b7fed3846fac32034fb893ef5aae
stunnel-debuginfo-4.29-3.el6_4.i686.rpm     MD5: 175964cf1cdb75dd12097e940dba9f92
SHA-256: 8e27e00556be33e56d25d2cfbbb62c8bbfd1531c5b8c7f46e3f29103c1410640
 
x86_64:
stunnel-4.29-3.el6_4.x86_64.rpm     MD5: df92cae3a6419aa78fe807a171def10e
SHA-256: 663254118cbf2b3be1cbe16ef41f050e169e609f37f1f508543a431c0b3e11e9
stunnel-debuginfo-4.29-3.el6_4.x86_64.rpm     MD5: 0d9e3982ec5845f2eef3ab57223b903f
SHA-256: 4a6fb1ea0c55678940473d332bf3b7424d7ad5a35c9b915b4cde3a8a31f14c6f
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
stunnel-4.29-3.el6_4.src.rpm     MD5: 57265c1df179e2ebd1ef8f06962f0c66
SHA-256: 5945acd3e414303d9086a7b35d92d84b78863752f3f518bb821eacce5796c50f
 
x86_64:
stunnel-4.29-3.el6_4.x86_64.rpm     MD5: df92cae3a6419aa78fe807a171def10e
SHA-256: 663254118cbf2b3be1cbe16ef41f050e169e609f37f1f508543a431c0b3e11e9
stunnel-debuginfo-4.29-3.el6_4.x86_64.rpm     MD5: 0d9e3982ec5845f2eef3ab57223b903f
SHA-256: 4a6fb1ea0c55678940473d332bf3b7424d7ad5a35c9b915b4cde3a8a31f14c6f
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
stunnel-4.29-3.el6_4.src.rpm     MD5: 57265c1df179e2ebd1ef8f06962f0c66
SHA-256: 5945acd3e414303d9086a7b35d92d84b78863752f3f518bb821eacce5796c50f
 
IA-32:
stunnel-4.29-3.el6_4.i686.rpm     MD5: 5e7dddb1802239b9b956915aafdc77d9
SHA-256: d43ea5796930a648c544475b02b4e06ea6b3b7fed3846fac32034fb893ef5aae
stunnel-debuginfo-4.29-3.el6_4.i686.rpm     MD5: 175964cf1cdb75dd12097e940dba9f92
SHA-256: 8e27e00556be33e56d25d2cfbbb62c8bbfd1531c5b8c7f46e3f29103c1410640
 
PPC:
stunnel-4.29-3.el6_4.ppc64.rpm     MD5: 31c43bbb4161945ef68468a2fc554292
SHA-256: 77d23b6f55d394aee9cadc3afca46606823d08b35aa58bc962b67953fa9c0999
stunnel-debuginfo-4.29-3.el6_4.ppc64.rpm     MD5: 12c3c6acc6cd0be993294cec5a4eb6fe
SHA-256: 7a4d25105dd5bc1f1a184511b1179aa3d12061226b7a62d042952ca91a71692e
 
s390x:
stunnel-4.29-3.el6_4.s390x.rpm     MD5: 6176a4ce344c11980b9ab358f0c571b4
SHA-256: c4dfceeeef2690059e25124d6cc1acb06e2401a7fe397cdb9a70c3ef0b41f650
stunnel-debuginfo-4.29-3.el6_4.s390x.rpm     MD5: 218498133a42c3225120c9aa8bff6528
SHA-256: 58c814c2fe8659609c540dc180ec75ea51e57077957fa77190d104e8b5da9411
 
x86_64:
stunnel-4.29-3.el6_4.x86_64.rpm     MD5: df92cae3a6419aa78fe807a171def10e
SHA-256: 663254118cbf2b3be1cbe16ef41f050e169e609f37f1f508543a431c0b3e11e9
stunnel-debuginfo-4.29-3.el6_4.x86_64.rpm     MD5: 0d9e3982ec5845f2eef3ab57223b903f
SHA-256: 4a6fb1ea0c55678940473d332bf3b7424d7ad5a35c9b915b4cde3a8a31f14c6f
 
Red Hat Enterprise Linux Server AUS (v. 6.4)

SRPMS:
stunnel-4.29-3.el6_4.src.rpm     MD5: 57265c1df179e2ebd1ef8f06962f0c66
SHA-256: 5945acd3e414303d9086a7b35d92d84b78863752f3f518bb821eacce5796c50f
 
x86_64:
stunnel-4.29-3.el6_4.x86_64.rpm     MD5: df92cae3a6419aa78fe807a171def10e
SHA-256: 663254118cbf2b3be1cbe16ef41f050e169e609f37f1f508543a431c0b3e11e9
stunnel-debuginfo-4.29-3.el6_4.x86_64.rpm     MD5: 0d9e3982ec5845f2eef3ab57223b903f
SHA-256: 4a6fb1ea0c55678940473d332bf3b7424d7ad5a35c9b915b4cde3a8a31f14c6f
 
Red Hat Enterprise Linux Server EUS (v. 6.4.z)

SRPMS:
stunnel-4.29-3.el6_4.src.rpm     MD5: 57265c1df179e2ebd1ef8f06962f0c66
SHA-256: 5945acd3e414303d9086a7b35d92d84b78863752f3f518bb821eacce5796c50f
 
IA-32:
stunnel-4.29-3.el6_4.i686.rpm     MD5: 5e7dddb1802239b9b956915aafdc77d9
SHA-256: d43ea5796930a648c544475b02b4e06ea6b3b7fed3846fac32034fb893ef5aae
stunnel-debuginfo-4.29-3.el6_4.i686.rpm     MD5: 175964cf1cdb75dd12097e940dba9f92
SHA-256: 8e27e00556be33e56d25d2cfbbb62c8bbfd1531c5b8c7f46e3f29103c1410640
 
PPC:
stunnel-4.29-3.el6_4.ppc64.rpm     MD5: 31c43bbb4161945ef68468a2fc554292
SHA-256: 77d23b6f55d394aee9cadc3afca46606823d08b35aa58bc962b67953fa9c0999
stunnel-debuginfo-4.29-3.el6_4.ppc64.rpm     MD5: 12c3c6acc6cd0be993294cec5a4eb6fe
SHA-256: 7a4d25105dd5bc1f1a184511b1179aa3d12061226b7a62d042952ca91a71692e
 
s390x:
stunnel-4.29-3.el6_4.s390x.rpm     MD5: 6176a4ce344c11980b9ab358f0c571b4
SHA-256: c4dfceeeef2690059e25124d6cc1acb06e2401a7fe397cdb9a70c3ef0b41f650
stunnel-debuginfo-4.29-3.el6_4.s390x.rpm     MD5: 218498133a42c3225120c9aa8bff6528
SHA-256: 58c814c2fe8659609c540dc180ec75ea51e57077957fa77190d104e8b5da9411
 
x86_64:
stunnel-4.29-3.el6_4.x86_64.rpm     MD5: df92cae3a6419aa78fe807a171def10e
SHA-256: 663254118cbf2b3be1cbe16ef41f050e169e609f37f1f508543a431c0b3e11e9
stunnel-debuginfo-4.29-3.el6_4.x86_64.rpm     MD5: 0d9e3982ec5845f2eef3ab57223b903f
SHA-256: 4a6fb1ea0c55678940473d332bf3b7424d7ad5a35c9b915b4cde3a8a31f14c6f
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
stunnel-4.29-3.el6_4.src.rpm     MD5: 57265c1df179e2ebd1ef8f06962f0c66
SHA-256: 5945acd3e414303d9086a7b35d92d84b78863752f3f518bb821eacce5796c50f
 
IA-32:
stunnel-4.29-3.el6_4.i686.rpm     MD5: 5e7dddb1802239b9b956915aafdc77d9
SHA-256: d43ea5796930a648c544475b02b4e06ea6b3b7fed3846fac32034fb893ef5aae
stunnel-debuginfo-4.29-3.el6_4.i686.rpm     MD5: 175964cf1cdb75dd12097e940dba9f92
SHA-256: 8e27e00556be33e56d25d2cfbbb62c8bbfd1531c5b8c7f46e3f29103c1410640
 
x86_64:
stunnel-4.29-3.el6_4.x86_64.rpm     MD5: df92cae3a6419aa78fe807a171def10e
SHA-256: 663254118cbf2b3be1cbe16ef41f050e169e609f37f1f508543a431c0b3e11e9
stunnel-debuginfo-4.29-3.el6_4.x86_64.rpm     MD5: 0d9e3982ec5845f2eef3ab57223b903f
SHA-256: 4a6fb1ea0c55678940473d332bf3b7424d7ad5a35c9b915b4cde3a8a31f14c6f
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

917839 - CVE-2013-1762 Stunnel: buffer overflow vulnerability due to incorrect integer conversion in the NTLM authentication of the CONNECT protocol negotiation


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/