Project

General

Profile

Actions

Bug #4298

closed

ssl : Integer underflow in ssl parsing SSLV3_HANDSHAKE_PROTOCOL

Added by Jeff Lucovsky almost 4 years ago. Updated over 3 years ago.

Status:
Closed
Priority:
Normal
Assignee:
Target version:
Affected Versions:
Effort:
Difficulty:
Label:

Description

Found by oss-fuzz
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28399

First we being parsing SSLV3_HANDSHAKE_PROTOCOL
We set message_start, bytes_processed and message_length in SSLv3ParseHandshakeProtocol

Then, we break out of this SSLV3_HANDSHAKE_PROTOCOL parsing because the other side of the connexion set SSL_AL_FLAG_CHANGE_CIPHER_SPEC
This leads to increasing bytes_processed at the end of SSLv3Decode

Then, we do not break anymore out of this SSLV3_HANDSHAKE_PROTOCOL parsing because the other side set SSL_AL_FLAG_STATE_CLIENT_HELLO
And bytes_processed is now over message_start + message_length


Related issues 1 (0 open1 closed)

Copied from Suricata - Bug #4233: ssl : Integer underflow in ssl parsing SSLV3_HANDSHAKE_PROTOCOLClosedPhilippe AntoineActions
Actions #1

Updated by Jeff Lucovsky almost 4 years ago

  • Copied from Bug #4233: ssl : Integer underflow in ssl parsing SSLV3_HANDSHAKE_PROTOCOL added
Actions #2

Updated by Victor Julien over 3 years ago

  • Status changed from Assigned to In Progress
  • Assignee changed from Shivani Bhardwaj to Victor Julien
Actions #4

Updated by Jeff Lucovsky over 3 years ago

  • Private changed from Yes to No
Actions

Also available in: Atom PDF