summaryrefslogtreecommitdiffstats
path: root/util
diff options
context:
space:
mode:
authorMatt Caswell <matt@openssl.org>2016-09-09 10:08:45 +0100
committerMatt Caswell <matt@openssl.org>2016-09-22 09:27:45 +0100
commite408c09bbf7c3057bda4b8d20bec1b3a7771c15b (patch)
treef1841a085ec97722ae1ad0d5014739bcd6c14fea /util
parenta449b47c7d8e20efc8cc524ed695a060b11ef889 (diff)
Fix OCSP Status Request extension unbounded memory growth
A malicious client can send an excessively large OCSP Status Request extension. If that client continually requests renegotiation, sending a large OCSP Status Request extension each time, then there will be unbounded memory growth on the server. This will eventually lead to a Denial Of Service attack through memory exhaustion. Servers with a default configuration are vulnerable even if they do not support OCSP. Builds using the "no-ocsp" build time option are not affected. I have also checked other extensions to see if they suffer from a similar problem but I could not find any other issues. CVE-2016-6304 Issue reported by Shi Lei. Reviewed-by: Rich Salz <rsalz@openssl.org>
Diffstat (limited to 'util')
0 files changed, 0 insertions, 0 deletions