SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Router/Bridge/Hub)  >   Juniper Junos Vendors:   Juniper
(Juniper Issues Fix for Juniper Junos) Stunnel Redirect Option Connection Forwarding Flaw Lets Remote Users Bypass Authentication
SecurityTracker Alert ID:  1040783
SecurityTracker URL:  http://securitytracker.com/id/1040783
CVE Reference:   CVE-2015-3644   (Links to External Site)
Date:  Apr 28 2018
Impact:   User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Stunnel. A remote user can bypass authentication on the target system. Juniper Junos is affected.

When the redirect option is used, the system forwards connections (other than the initial connection) with the 'connect' specification indicating successful authentcation instead of the 'redirect' specification.

Johan Olofsson reported this vulnerability.

Impact:   A remote user can bypass authentication on the target system.
Solution:   The Juniper has issued a fix (12.1X46-D76, 12.3X48-D50, 15.1R7, 15.1X49-D100, 16.1R5, 16.2R2, 17.1R2, 17.2R1).

The Juniper advisory is available at:

https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10852

Vendor URL:  kb.juniper.net/InfoCenter/index?page=content&id=JSA10852 (Links to External Site)
Cause:   Authentication error

Message History:   This archive entry is a follow-up to the message listed below.
May 14 2015 Stunnel Redirect Option Connection Forwarding Flaw Lets Remote Users Bypass Authentication



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC