• D
    Fix for CVE-2014-0195 · 410e444b
    Dr. Stephen Henson 提交于
    A buffer overrun attack can be triggered by sending invalid DTLS fragments
    to an OpenSSL DTLS client or server. This is potentially exploitable to
    run arbitrary code on a vulnerable client or server.
    
    Fixed by adding consistency check for DTLS fragments.
    
    Thanks to Jüri Aedla for reporting this issue.
    (cherry picked from commit 1632ef744872edc2aa2a53d487d3e79c965a4ad3)
    410e444b
d1_both.c 40.9 KB