Fix seg fault with 0 p val in SKE
authorGuy Leaver (guleaver) <guleaver@cisco.com>
Fri, 7 Aug 2015 14:45:21 +0000 (15:45 +0100)
committerMatt Caswell <matt@openssl.org>
Tue, 11 Aug 2015 19:23:00 +0000 (20:23 +0100)
commitf15c99f4d4a96b692bdbb6f343c9112f2fa5a8ed
tree8ab6d76a66d45f4513a89319638528424dbaaad5
parent507ea77b82f99af8cdae22bebb49fb2772d95330
Fix seg fault with 0 p val in SKE

If a client receives a ServerKeyExchange for an anon DH ciphersuite with the
value of p set to 0 then a seg fault can occur. This commits adds a test to
reject p, g and pub key parameters that have a 0 value (in accordance with
RFC 5246)

The security vulnerability only affects master and 1.0.2, but the fix is
additionally applied to 1.0.1 for additional confidence.

CVE-2015-1794

Reviewed-by: Richard Levitte <levitte@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
ssl/s3_clnt.c
ssl/ssl.h
ssl/ssl_err.c