TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

DoS exploit in openssl (Debian stable only)

14 点作者 Gobiel将近 11 年前

5 条评论

agl将近 11 年前
Previously discussed: <a href="https://news.ycombinator.com/item?id=7682537" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=7682537</a><p>My comment from last time:<p>Good to note that this was found with KLEE[1]. KLEE is a good for symbolic execution of code and is very cool[2].<p>This only triggers a crash if you use RELEASE_BUFFERS (not the default) and a warning alert is written when the socket buffer is full. About the only case where a warning alert is generated is when a client attempts a renegotiation without the renegotiation extension (unless insecure renegotiation is allowed by the app). I&#x27;ve not been able to trigger the bug in a test because code generally stops reading once the socket buffer is full so you need the application to exactly fill the socket buffer (so that it doesn&#x27;t get EAGAIN), then a warning alert can just exceed it.<p>[1] <a href="http://marc.info/?l=openssl-dev&amp;m=139809493725682&amp;w=2" rel="nofollow">http:&#x2F;&#x2F;marc.info&#x2F;?l=openssl-dev&amp;m=139809493725682&amp;w=2</a> [2] <a href="http://klee.github.io/klee/" rel="nofollow">http:&#x2F;&#x2F;klee.github.io&#x2F;klee&#x2F;</a>
calpaterson将近 11 年前
I can&#x27;t see why the headline says this is exclusive to Debian stable - it applies to any distribution that shipped with OpenSSL 1.0 or greater. The RH bugtracker only mentions that RHEL5 is immune because they didn&#x27;t ship OpenSSL 1.0. It seems that several packages enable SSL_MODE_RELEASE_BUFFERS including ruby and node:<p><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1093837#c1" rel="nofollow">https:&#x2F;&#x2F;bugzilla.redhat.com&#x2F;show_bug.cgi?id=1093837#c1</a>
itamarhaber将近 11 年前
Good thing this only affects %29.8 of Linux distros out there (<a href="http://w3techs.com/technologies/details/os-linux/all/all" rel="nofollow">http:&#x2F;&#x2F;w3techs.com&#x2F;technologies&#x2F;details&#x2F;os-linux&#x2F;all&#x2F;all</a>) :P
0x0将近 11 年前
I don&#x27;t think this is Debian stable only?
评论 #7763246 未加载
评论 #7763285 未加载
jtwaleson将近 11 年前
Does anyone know which packages have SSL_MODE_RELEASE_BUFFERS enabled and are vulnerable?
评论 #7763288 未加载