oss-sec mailing list archives
CVE Request: AWS s2n
From: Markus Vervier <markus.vervier () lsexperts de>
Date: Tue, 14 Jul 2015 17:08:08 +0200
Hi, I would like to request a CVE for s2n. When a server is sending invalid DH values during a handshake a BIGNUM value is not properly initialized. This causes a null pointer dereference in a s2n based client leading to a crash or possible worse on old systems (e.g. on Debian kernels lower than 2.6.26). Technical details and a patch are available here: https://github.com/awslabs/s2n/pull/124 The fix was merged and is in commit 9af6ba1815dfd5c00361cc3bd45cee1d64e0c3bf. Markus -- Markus Vervier (IT Security Consultant and Software Developer), http://www.lsexperts.de LSE Leading Security Experts GmbH, Postfach 100121, 64201 Darmstadt Tel.: +49 (0) 6151 86086-261, Fax: -299, Unternehmenssitz: Weiterstadt, Amtsgericht Darmstadt: HRB8649 Geschäftsführer: Oliver Michel, Sven Walther
Attachment:
smime.p7s
Description: S/MIME Cryptographic Signature
Current thread:
- CVE Request: AWS s2n Markus Vervier (Jul 14)
- Re: CVE Request: AWS s2n Kurt Seifried (Jul 14)
- Re: CVE Request: AWS s2n Markus Vervier (Jul 14)
- Re: CVE Request: AWS s2n Kurt Seifried (Jul 14)
- Re: CVE Request: AWS s2n Anthony Liguori (Jul 16)
- Re: CVE Request: AWS s2n MacCarthaigh, Colm (Jul 16)
- Re: CVE Request: AWS s2n Markus Vervier (Jul 22)
- Re: CVE Request: AWS s2n Markus Vervier (Jul 14)
- Re: CVE Request: AWS s2n Kurt Seifried (Jul 14)