diff options
author | 2014-06-05 17:53:02 +0000 | |
---|---|---|
committer | 2014-06-05 17:53:02 +0000 | |
commit | 1aa2bd1933f68335de427dbf34ece22dba428a97 (patch) | |
tree | 7c4873c9b78e5e39da368bd5842f72f6cf6c82ee /lib | |
parent | Ensure that sess_cert is not NULL before trying to use it. (diff) | |
download | wireguard-openbsd-1aa2bd1933f68335de427dbf34ece22dba428a97.tar.xz wireguard-openbsd-1aa2bd1933f68335de427dbf34ece22dba428a97.zip |
Do not recurse when a 'Hello Request' message is received while getting
DTLS fragments. A stream of 'Hello Request' messages will result in
infinite recursion, eventually crashing the DTLS client or server.
Fixes CVE-2014-0221, from OpenSSL.
Reported to OpenSSL by Imre Rad.
Diffstat (limited to 'lib')
-rw-r--r-- | lib/libssl/d1_both.c | 3 | ||||
-rw-r--r-- | lib/libssl/src/ssl/d1_both.c | 3 |
2 files changed, 4 insertions, 2 deletions
diff --git a/lib/libssl/d1_both.c b/lib/libssl/d1_both.c index 3674ed60461..66250556451 100644 --- a/lib/libssl/d1_both.c +++ b/lib/libssl/d1_both.c @@ -743,6 +743,7 @@ dtls1_get_message_fragment(SSL *s, int st1, int stn, long max, int *ok) int i, al; struct hm_header_st msg_hdr; +again: /* see if we have the required fragment already */ if ((frag_len = dtls1_retrieve_buffered_fragment(s, max, ok)) || *ok) { if (*ok) @@ -801,7 +802,7 @@ dtls1_get_message_fragment(SSL *s, int st1, int stn, long max, int *ok) s->msg_callback_arg); s->init_num = 0; - return dtls1_get_message_fragment(s, st1, stn, max, ok); + goto again; } else /* Incorrectly formated Hello request */ { diff --git a/lib/libssl/src/ssl/d1_both.c b/lib/libssl/src/ssl/d1_both.c index 3674ed60461..66250556451 100644 --- a/lib/libssl/src/ssl/d1_both.c +++ b/lib/libssl/src/ssl/d1_both.c @@ -743,6 +743,7 @@ dtls1_get_message_fragment(SSL *s, int st1, int stn, long max, int *ok) int i, al; struct hm_header_st msg_hdr; +again: /* see if we have the required fragment already */ if ((frag_len = dtls1_retrieve_buffered_fragment(s, max, ok)) || *ok) { if (*ok) @@ -801,7 +802,7 @@ dtls1_get_message_fragment(SSL *s, int st1, int stn, long max, int *ok) s->msg_callback_arg); s->init_num = 0; - return dtls1_get_message_fragment(s, st1, stn, max, ok); + goto again; } else /* Incorrectly formated Hello request */ { |