OpenSSL CVE-2016-2177 Buffer Overflow Vulnerability

description-logoDescription

Severity: LowAvoid some undefined pointer arithmeticA common idiom in the codebase is to check limits in the following manner:Where "p" points to some malloc'd data of SIZE bytes andlimit == p + SIZEmessage).The rules of C pointer arithmetic are such that "p + len" is only welldefined where len <= SIZE. Therefore the above idiom is actuallyundefined behaviour.For example this could cause problems if some malloc implementationprovides an address for "p" such that "p + len" actually overflows forvalues of len that are too big and therefore p + len < limit.OpenSSL 1.0.2 users should upgrade to 1.0.2iOpenSSL 1.0.1 users should upgrade to 1.0.1uThis issue was reported to OpenSSL on 4th May 2016 by Guido Vranken. Thefix was developed by Matt Caswell of the OpenSSL development team.

affected-products-logoAffected Applications

OpenSSL

CVE References

CVE-2016-2177