Project

General

Profile

Actions

Bug #3853

closed

Multi-byte Heap buffer over-read in ssl parser

Added by Philippe Antoine over 3 years ago. Updated over 3 years ago.

Status:
Closed
Priority:
Normal
Target version:
Affected Versions:
Effort:
Difficulty:
Label:
Needs backport, Needs backport to 4.1, Needs backport to 5.0

Description

Found by oss-fuzz
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24534

Problem is reuse of session_id_length in different contexts : SSLv2 and TLSv1.3


Related issues 2 (0 open2 closed)

Copied to Suricata - Bug #3941: Multi-byte Heap buffer over-read in ssl parserClosedShivani BhardwajActions
Copied to Suricata - Bug #3942: Multi-byte Heap buffer over-read in ssl parserClosedJeff LucovskyActions
Actions #1

Updated by Philippe Antoine over 3 years ago

  • Status changed from Assigned to In Review

Gitlab MR

Actions #2

Updated by Philippe Antoine over 3 years ago

  • Target version set to 6.0.0rc1
Actions #3

Updated by Victor Julien over 3 years ago

  • Target version changed from 6.0.0rc1 to 6.0.0
  • Affected Versions 6.0.0rc1 added
Actions #4

Updated by Jeff Lucovsky over 3 years ago

  • Copied to Bug #3941: Multi-byte Heap buffer over-read in ssl parser added
Actions #5

Updated by Jeff Lucovsky over 3 years ago

  • Copied to Bug #3942: Multi-byte Heap buffer over-read in ssl parser added
Actions #6

Updated by Victor Julien over 3 years ago

  • Status changed from In Review to Closed
Actions #7

Updated by Victor Julien over 3 years ago

  • Private changed from Yes to No
Actions

Also available in: Atom PDF