Skip to content

Three out-of-bound pointers (check_certificate_request) #196

@bathooman

Description

@bathooman

Description

  • Type: Out of bound pointer
  • Priority: High
  • The bug affects the develop branch
  • This affects the processing of the messages on the client-side.

How to trigger

image

Upon receipt of a Certificate Request message, if the message is maliciously crafted in a way that the value of the Certificate Types Count and Signature Hash Algorithms Length are not within the boundary of the Fragment Length, three out-of-bound pointer de-reference occurs in the following three points:

  1. https://github.com/eclipse/tinydtls/blob/main/dtls.c#L3529
  2. https://github.com/eclipse/tinydtls/blob/main/dtls.c#L3531
  3. https://github.com/eclipse/tinydtls/blob/main/dtls.c#L3508

My suggestion:

There should always be a check that ensures that the fields that represent the size of fields are within the boundary of data_length.

Metadata

Metadata

Assignees

No one assigned

    Labels

    bugSomething isn't working

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions