1. 02 Oct, 2016 1 commit
  2. 01 Oct, 2016 3 commits
  3. 29 Sep, 2016 4 commits
  4. 28 Sep, 2016 5 commits
  5. 27 Sep, 2016 1 commit
  6. 26 Sep, 2016 12 commits
  7. 22 Sep, 2016 12 commits
  8. 21 Sep, 2016 2 commits
    • Andy Polyakov's avatar
      db610cb2
    • Matt Caswell's avatar
      Excessive allocation of memory in dtls1_preprocess_fragment() · df6b5e29
      Matt Caswell authored
      This issue is very similar to CVE-2016-6307 described in the previous
      commit. The underlying defect is different but the security analysis and
      impacts are the same except that it impacts DTLS.
      
      A DTLS message includes 3 bytes for its length in the header for the
      message.
      This would allow for messages up to 16Mb in length. Messages of this length
      are excessive and OpenSSL includes a check to ensure that a peer is sending
      reasonably sized messages in order to avoid too much memory being consumed
      to service a connection. A flaw in the logic of version 1.1.0 means that
      memory for the message is allocated too early, prior to the excessive
      message length check. Due to way memory is allocated in OpenSSL this could
      mean an attacker could force up to 21Mb to be allocated to service a
      connection. This could lead to a Denial of Service through memory
      exhaustion. However, the excessive message length check still takes place,
      and this would cause the connec...
      df6b5e29