Matt Caswell 1250f12613 Fix DTLS handshake message size checks.
In |dtls1_reassemble_fragment|, the value of
|msg_hdr->frag_off+frag_len| was being checked against the maximum
handshake message size, but then |msg_len| bytes were allocated for the
fragment buffer. This means that so long as the fragment was within the
allowed size, the pending handshake message could consume 16MB + 2MB
(for the reassembly bitmap). Approx 10 outstanding handshake messages
are allowed, meaning that an attacker could consume ~180MB per DTLS
connection.

In the non-fragmented path (in |dtls1_process_out_of_seq_message|), no
check was applied.

Fixes CVE-2014-3506

Wholly based on patch by Adam Langley with one minor amendment.

Reviewed-by: Emilia Käsper <emilia@openssl.org>
2014-08-06 20:36:40 +01:00
..
2012-04-16 17:42:36 +00:00
2013-11-01 21:41:52 +00:00
2013-04-09 14:02:48 +01:00
2013-04-09 14:02:48 +01:00
2012-07-05 13:20:19 +00:00
2009-04-23 16:32:42 +00:00
2014-02-26 15:33:11 +00:00
2014-03-28 14:56:30 +00:00
2014-06-09 12:09:52 +01:00
2013-02-06 14:16:55 +00:00
2014-03-28 14:56:30 +00:00
2014-03-28 14:56:30 +00:00
2014-07-04 13:26:35 +01:00
2014-07-05 23:56:54 +02:00
2014-07-04 13:26:35 +01:00
2002-07-10 07:01:54 +00:00
2014-03-28 14:56:30 +00:00
2011-11-21 22:52:13 +00:00
2014-07-04 13:26:35 +01:00
2013-05-13 22:49:58 +02:00
2014-07-05 15:00:53 +01:00
2014-07-04 13:26:35 +01:00
2014-03-28 14:56:30 +00:00
2014-07-04 13:26:35 +01:00
2012-07-05 13:20:02 +00:00
2014-07-24 19:41:29 +01:00
2014-07-04 13:26:35 +01:00
2014-07-02 00:11:10 +01:00
2009-12-27 22:58:55 +00:00
2014-07-04 13:26:35 +01:00
2011-12-14 22:17:06 +00:00