From 607e77300ead771e2a61a58df3981dad773c8f7a Mon Sep 17 00:00:00 2001 From: Alessandro Ghedini Date: Wed, 13 Jan 2016 12:49:24 +0000 Subject: [PATCH] Validate ClientHello session_id field length and send alert on failure RT#4080 Reviewed-by: Rich Salz Reviewed-by: Matt Caswell --- ssl/s2_srvr.c | 5 +++++ ssl/s3_srvr.c | 6 ++++++ ssl/ssl_sess.c | 3 --- 3 files changed, 11 insertions(+), 3 deletions(-) diff --git a/ssl/s2_srvr.c b/ssl/s2_srvr.c index 4289272b73..5e2e0acc35 100644 --- a/ssl/s2_srvr.c +++ b/ssl/s2_srvr.c @@ -598,6 +598,11 @@ static int get_client_hello(SSL *s) s->s2->tmp.cipher_spec_length = i; n2s(p, i); s->s2->tmp.session_id_length = i; + if ((i < 0) || (i > SSL_MAX_SSL_SESSION_ID_LENGTH)) { + ssl2_return_error(s, SSL2_PE_UNDEFINED_ERROR); + SSLerr(SSL_F_GET_CLIENT_HELLO, SSL_R_LENGTH_MISMATCH); + return -1; + } n2s(p, i); s->s2->challenge_length = i; if ((i < SSL2_MIN_CHALLENGE_LENGTH) || diff --git a/ssl/s3_srvr.c b/ssl/s3_srvr.c index 9d6886c07d..9b05f189d5 100644 --- a/ssl/s3_srvr.c +++ b/ssl/s3_srvr.c @@ -1004,6 +1004,12 @@ int ssl3_get_client_hello(SSL *s) goto f_err; } + if ((j < 0) || (j > SSL_MAX_SSL_SESSION_ID_LENGTH)) { + al = SSL_AD_DECODE_ERROR; + SSLerr(SSL_F_SSL3_GET_CLIENT_HELLO, SSL_R_LENGTH_MISMATCH); + goto f_err; + } + s->hit = 0; /* * Versions before 0.9.7 always allow clients to resume sessions in diff --git a/ssl/ssl_sess.c b/ssl/ssl_sess.c index 68390d3108..b182998343 100644 --- a/ssl/ssl_sess.c +++ b/ssl/ssl_sess.c @@ -573,9 +573,6 @@ int ssl_get_prev_session(SSL *s, unsigned char *session_id, int len, int r; #endif - if (len < 0 || len > SSL_MAX_SSL_SESSION_ID_LENGTH) - goto err; - if (session_id + len > limit) { fatal = 1; goto err; -- 2.25.1