As I recall, the rsaref2 buffer problems were exploitable, at least as
used by ssh.

fortunately, things don't look so bad..

On a quick first look at openssl and openssh it appears that
RSA_sign/RSA_sign_ASN1_OCTET_STRING size the output buffer
appropriately and are not vulnerable; similarly, the calls to the same
function from openssh hand it an appropriately-sized buffer.

the interface really could stand some improvement, though.

                                        - Bill
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to