Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 9512] New: dtls: fix buffer overflow in mac check

Date: Thu, 05 Dec 2013 16:40:36 +0000
Bug ID 9512
Summary dtls: fix buffer overflow in mac check
Classification Unclassified
Product Wireshark
Version SVN
Hardware All
OS All
Status UNCONFIRMED
Severity Critical
Priority Low
Component Dissection engine (libwireshark)
Assignee [email protected]
Reporter [email protected]

Created attachment 12237 [details]
dtls: fix buffer overflow in mac check

Build Information:
Paste the COMPLETE build information from "Help->About Wireshark", "wireshark
-v", or "tshark -v".
--
With SHA256 32 bytes and with SHA384 48 bytes are needed for the hash
in dtls_check_mac(), but it only had 20, which was enough for SHA1.
In dtls_check_mac() ssl_hmac_final() is called with a buffer of 20
bytes, but it needed more, which caused a buffer overflow.


You are receiving this mail because:
  • You are watching all bug changes.