An issue was discovered in app-layer-ssl.c in Suricata 4.1.4. Upon receiving a corrupted SSLv3 (TLS 1.2) packet, the parser function TLSDecodeHSHelloExtensions tries to access a memory region that is not allocated, because the expected length of HSHelloExtensions does not match the real length of the HSHelloExtensions part of the packet.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://lists.openinfosecfoundation.org/pipermail/oisf-announce/ | third party advisory |
https://suricata-ids.org/2019/09/24/suricata-4-1-5-released/ | release notes vendor advisory |