From: Sunil Singh [mailto:ekodevelop...@gmail.com] Sent: Saturday, August 27, 2016 2:42 AM To: Salz, Rich; openssl-secur...@openssl.org Subject: Re: [openssl-security] Multiple issue with BIO_new_file Internal function (potential stack overflow/Crash)
I don't think its right to say that its not a security bug, if somebody pass a huge filename string which results is _alloca failure obviously its leads to stack overflow on the same grounds i can lightly compare it to malloc and not checking its return value? Input to function can come from any place why do you think its should not be validated? Also if i agrees with you i can say simply strlen(...) is also valid then but its depreciated by MSFT and other strlen_l(...) is provided which accept size For you convenience check this http://linux.die.net/man/3/alloca<https://urldefense.proofpoint.com/v2/url?u=http-3A__linux.die.net_man_3_alloca&d=DQMFaQ&c=96ZbZZcaMF4w0F4jpN6LZg&r=4LM0GbR0h9Fvx86FtsKI-w&m=_xenUXw54Vwrmr9QVCWYxSONPQG94qwrC9F7G7ZdMRs&s=d3M070FP5xpSNFJlZjfQrt1V6g2ye8RbAsBw7qDF2Zo&e=> http://stackoverflow.com/questions/1018853/why-is-the-use-of-alloca-not-considered-good-practice<https://urldefense.proofpoint.com/v2/url?u=http-3A__stackoverflow.com_questions_1018853_why-2Dis-2Dthe-2Duse-2Dof-2Dalloca-2Dnot-2Dconsidered-2Dgood-2Dpractice&d=DQMFaQ&c=96ZbZZcaMF4w0F4jpN6LZg&r=4LM0GbR0h9Fvx86FtsKI-w&m=_xenUXw54Vwrmr9QVCWYxSONPQG94qwrC9F7G7ZdMRs&s=hOMJ7I8gD1x8k9rv16QJesfvbGKSCsEdufsBAYtkIKk&e=> Also previously i provided already MSFT link which clearly mentions about its usage Thanks On Fri, Aug 26, 2016 at 10:44 PM, Salz, Rich <rs...@akamai.com<mailto:rs...@akamai.com>> wrote: This is not a security bug; an application program could mis-use the API. Thanks for looking at the code! -- Senior Architect, Akamai Technologies IM: richs...@jabber.at<mailto:richs...@jabber.at> Twitter: RichSalz From: Sunil Singh [mailto:ekodevelop...@gmail.com<mailto:ekodevelop...@gmail.com>] Sent: Friday, August 26, 2016 1:09 PM To: openssl-secur...@openssl.org<mailto:openssl-secur...@openssl.org> Subject: [openssl-security] Multiple issue with BIO_new_file Internal function (potential stack overflow/Crash) Hello, While working on the program of https://hackerone.com/ibb-openssl<https://urldefense.proofpoint.com/v2/url?u=https-3A__hackerone.com_ibb-2Dopenssl&d=DQMFaQ&c=96ZbZZcaMF4w0F4jpN6LZg&r=4LM0GbR0h9Fvx86FtsKI-w&m=O8lneP_6_5N9qiCekWJOk7IstOy6tCiTBi3rMhcTchQ&s=wNNnK1nNjPnJhjd9CDXvAHuCzefnlYSwSb9hfmXaiss&e=> this was found Report Below:- Function Design issue 1. in BIO_new_file no check of filename param 2. in internal function call static FILE *file_fopen(const char *filename, const char *mode) again no check of filename param 3. At WCHAR *wfilename = _alloca(sz * sizeof(WCHAR)) Refer to https://msdn.microsoft.com/en-us/library/wb1s57t5.aspx<https://urldefense.proofpoint.com/v2/url?u=https-3A__msdn.microsoft.com_en-2Dus_library_wb1s57t5.aspx&d=DQMFaQ&c=96ZbZZcaMF4w0F4jpN6LZg&r=4LM0GbR0h9Fvx86FtsKI-w&m=O8lneP_6_5N9qiCekWJOk7IstOy6tCiTBi3rMhcTchQ&s=3Ph_yoB8OERME1nlep5G0JENm0w51OnCbZaLDpAdHqM&e=> for proper use of _alloca it must be guarded can cause stack overflow in case stack memory not fulfilled and again no return value(wfilename ) is checked Thanks, Sunil Singh -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4662 Please log in as guest with password guest if prompted -- openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev