Advisory ID

12769

Release date

20160923

Last Updated

20160923

Issue Severity

None

 

Source

Source

openssl.org

Release date

20160922

CVSS v2 Base Score

Low

Problem Description

A TLS message includes 3 bytes for its length in the header for the message. This would allow for messages up to 16Mb in length. Messages of this length are excessive and OpenSSL includes a check to ensure that a peer is sending reasonably sized messages in order to avoid too much memory being consumed to service a connection. A flaw in the logic of version 1.1.0 means that memory for the message is allocated too early, prior to the excessive message length check. Due to the way memory is allocated in OpenSSL, this could mean an attacker could force up to 21Mb to be allocated to service a connection. This could lead to a Denial of Service through memory exhaustion.

Impact

None.

 

Affected Products

None - no Foxt products use the vulnerable OpenSSL version.

Workaround

N/A.

Obtaining Fixed Software

N/A.

 

External References

OpenSSL Security Advisory










Still have questions? We can help. Submit a case to Technical Support.

Last Modified On: April 16, 2019