First published: Thu Jul 18 2024(Updated: )
It was discovered that stunnel did not properly validate client certificates when configured to use both the redirect and verifyChain options. A remote attacker could potentially use this issue to obtain sensitive information by accessing the tunneled service.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/stunnel4 | <3:5.56-1ubuntu0.2 | 3:5.56-1ubuntu0.2 |
Ubuntu Linux | =20.04 | |
All of | ||
ubuntu/stunnel4 | <3:5.44-1ubuntu3+esm1 | 3:5.44-1ubuntu3+esm1 |
Ubuntu Linux | =18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-6901-1 is considered high due to the potential for sensitive information exposure by remote attackers.
To fix USN-6901-1, update the stunnel4 package to either version 3:5.56-1ubuntu0.2 for Ubuntu 20.04 or 3:5.44-1ubuntu3+esm1 for Ubuntu 18.04.
USN-6901-1 addresses a vulnerability in stunnel related to improper validation of client certificates when using redirect and verifyChain options.
USN-6901-1 affects users of stunnel4 on Ubuntu 20.04 and 18.04 who have configured both the redirect and verifyChain options.
Not addressing USN-6901-1 may allow remote attackers to exploit the vulnerability and obtain sensitive information through the tunneled service.