First published: Mon Feb 12 2001(Updated: )
Format string vulnerability in stunnel 3.8 and earlier allows attackers to execute arbitrary commands via a malformed ident username.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
stunnel | =3.7 | |
stunnel | =3.3 | |
stunnel | =3.4a | |
stunnel | =3.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0060 has a high severity level due to its potential to allow arbitrary command execution.
To fix CVE-2001-0060, upgrade stunnel to version 3.9 or later.
CVE-2001-0060 affects stunnel versions 3.7, 3.3, 3.4a, and 3.8.
CVE-2001-0060 can be exploited to execute arbitrary commands through a crafted ident username.
While CVE-2001-0060 is an older vulnerability, it remains relevant for systems still running affected versions of stunnel.