by Gobiel on 5/18/14, 2:16 PM with 9 comments
by agl on 5/18/14, 3:29 PM
My comment from last time:
Good to note that this was found with KLEE[1]. KLEE is a good for symbolic execution of code and is very cool[2].
This only triggers a crash if you use RELEASE_BUFFERS (not the default) and a warning alert is written when the socket buffer is full. About the only case where a warning alert is generated is when a client attempts a renegotiation without the renegotiation extension (unless insecure renegotiation is allowed by the app). I've not been able to trigger the bug in a test because code generally stops reading once the socket buffer is full so you need the application to exactly fill the socket buffer (so that it doesn't get EAGAIN), then a warning alert can just exceed it.
[1] http://marc.info/?l=openssl-dev&m=139809493725682&w=2 [2] http://klee.github.io/klee/
by calpaterson on 5/18/14, 3:17 PM
by itamarhaber on 5/18/14, 2:28 PM
by 0x0 on 5/18/14, 2:50 PM
by jtwaleson on 5/18/14, 2:51 PM