mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-26 17:28:29 -05:00
bb52293e71
Some OpenSSL versions have vulnerability in TLS heartbeat request processing. Check the processed message to determine if the attack has been used and if so, do not send the response to the peer. This does not prevent the buffer read overflow within OpenSSL, but this prevents the attacker from receiving the information. This change is an additional layer of protection if some yet to be identified paths were to expose this OpenSSL vulnerability. However, the way OpenSSL is used for EAP-TLS/TTLS/PEAP/FAST in hostapd/wpa_supplicant was already rejecting the messages before the response goes out and as such, this additional change is unlikely to be needed to avoid the issue. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> |
||
---|---|---|
.. | ||
ap | ||
common | ||
crypto | ||
drivers | ||
eap_common | ||
eap_peer | ||
eap_server | ||
eapol_auth | ||
eapol_supp | ||
l2_packet | ||
p2p | ||
radius | ||
rsn_supp | ||
tls | ||
utils | ||
wps | ||
lib.rules | ||
Makefile |