Actions
Security #958
closedSecurity #955: SSL parsing issue
SSL parsing issue (master)
Git IDs:
cd80dcbfd4616582daa39fa56960208ee8e23262
cd7f0273a21880cff8ff927abb327a30270015ba
Severity:
Disclosure Date:
Updated by Victor Julien about 12 years ago
- Status changed from Assigned to Closed
- % Done changed from 0 to 100
Fixed by:
commit cd7f0273a21880cff8ff927abb327a30270015ba
Author: Anoop Saldanha <anoopsaldanha@gmail.com>
Date: Tue Sep 24 11:31:37 2013 +0530
Add decoder event rule for tls event "invalid_ssl_record", which will now be available "app-layer-event:tls.invalid_ssl_record".
commit cd80dcbfd4616582daa39fa56960208ee8e23262
Author: Anoop Saldanha <anoopsaldanha@gmail.com>
Date: Fri Sep 13 19:57:29 2013 +0530
bug #955 - Fix SSL parsing issue.
The parser wasn't carrying out a bounds check on record length while
in the middle of parsing a handshake. As a result we would step onto the
next record header and consider it a part of the current handshake.
- Contains an unittest to test the issue.
- Disable the duplicate parser unittest registration.
The issue came to light through an irregular ssl record, which was
reported by Sebastian Roschke, via CVE-2013-5919.
Thanks to Sebastian Roschke for reporting this issue.
Updated by Victor Julien about 5 years ago
- Tracker changed from Bug to Security
- CVE set to 2013-5919
- Git IDs updated (diff)
Actions