Actions
Security #958
closedSecurity #955: SSL parsing issue
SSL parsing issue (master)
Git IDs:
cd80dcbfd4616582daa39fa56960208ee8e23262
cd7f0273a21880cff8ff927abb327a30270015ba
Severity:
Disclosure Date:
Updated by Victor Julien about 11 years ago
- Status changed from Assigned to Closed
- % Done changed from 0 to 100
Fixed by:
commit cd7f0273a21880cff8ff927abb327a30270015ba Author: Anoop Saldanha <anoopsaldanha@gmail.com> Date: Tue Sep 24 11:31:37 2013 +0530 Add decoder event rule for tls event "invalid_ssl_record", which will now be available "app-layer-event:tls.invalid_ssl_record". commit cd80dcbfd4616582daa39fa56960208ee8e23262 Author: Anoop Saldanha <anoopsaldanha@gmail.com> Date: Fri Sep 13 19:57:29 2013 +0530 bug #955 - Fix SSL parsing issue. The parser wasn't carrying out a bounds check on record length while in the middle of parsing a handshake. As a result we would step onto the next record header and consider it a part of the current handshake. - Contains an unittest to test the issue. - Disable the duplicate parser unittest registration. The issue came to light through an irregular ssl record, which was reported by Sebastian Roschke, via CVE-2013-5919. Thanks to Sebastian Roschke for reporting this issue.
Updated by Victor Julien over 4 years ago
- Tracker changed from Bug to Security
- CVE set to 2013-5919
- Git IDs updated (diff)
Actions