The OCSP functionality in stunnel before 4.24 does not properly search certificate revocation lists (CRL), which allows remote attackers to bypass intended access restrictions by using revoked certificates.
2008-05-23T15:32:00.000
2025-04-09T00:30:58.490
Deferred
CVSSv2: 6.8 (MEDIUM)
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.6
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | stunnel | stunnel | 3.4a | Yes |
Application | stunnel | stunnel | 3.5 | Yes |
Application | stunnel | stunnel | 3.6 | Yes |
Application | stunnel | stunnel | 3.7 | Yes |
Application | stunnel | stunnel | 3.8 | Yes |
Application | stunnel | stunnel | 3.8p1 | Yes |
Application | stunnel | stunnel | 3.8p2 | Yes |
Application | stunnel | stunnel | 3.8p3 | Yes |
Application | stunnel | stunnel | 3.8p4 | Yes |
Application | stunnel | stunnel | 3.9 | Yes |
Application | stunnel | stunnel | 3.10 | Yes |
Application | stunnel | stunnel | 3.11 | Yes |
Application | stunnel | stunnel | 3.12 | Yes |
Application | stunnel | stunnel | 3.13 | Yes |
Application | stunnel | stunnel | 3.14 | Yes |
Application | stunnel | stunnel | 3.15 | Yes |
Application | stunnel | stunnel | 3.16 | Yes |
Application | stunnel | stunnel | 3.17 | Yes |
Application | stunnel | stunnel | 3.18 | Yes |
Application | stunnel | stunnel | 3.19 | Yes |
Application | stunnel | stunnel | 3.20 | Yes |
Application | stunnel | stunnel | 3.21 | Yes |
Application | stunnel | stunnel | 3.21a | Yes |
Application | stunnel | stunnel | 3.21b | Yes |
Application | stunnel | stunnel | 3.21c | Yes |
Application | stunnel | stunnel | 3.22 | Yes |
Application | stunnel | stunnel | 3.23 | Yes |
Application | stunnel | stunnel | 3.24 | Yes |
Application | stunnel | stunnel | 3.25 | Yes |
Application | stunnel | stunnel | 3.26 | Yes |
Application | stunnel | stunnel | 4.00 | Yes |
Application | stunnel | stunnel | 4.01 | Yes |
Application | stunnel | stunnel | 4.02 | Yes |
Application | stunnel | stunnel | 4.03 | Yes |
Application | stunnel | stunnel | 4.04 | Yes |
Application | stunnel | stunnel | 4.05 | Yes |
Application | stunnel | stunnel | 4.06 | Yes |
Application | stunnel | stunnel | 4.07 | Yes |
Application | stunnel | stunnel | 4.08 | Yes |
Application | stunnel | stunnel | 4.09 | Yes |
Application | stunnel | stunnel | 4.10 | Yes |
Application | stunnel | stunnel | 4.11 | Yes |
Application | stunnel | stunnel | 4.12 | Yes |
Application | stunnel | stunnel | 4.13 | Yes |
Application | stunnel | stunnel | 4.14 | Yes |
Application | stunnel | stunnel | 4.15 | Yes |
Application | stunnel | stunnel | 4.16 | Yes |
Application | stunnel | stunnel | 4.17 | Yes |
Application | stunnel | stunnel | 4.18 | Yes |
Application | stunnel | stunnel | 4.19 | Yes |
Application | stunnel | stunnel | 4.20 | Yes |
Application | stunnel | stunnel | 4.21 | Yes |
Application | stunnel | stunnel | 4.22 | Yes |
Application | stunnel | stunnel | 4.23 | Yes |