Hi Bug Folks!

I think I found one in ssl23_connect() in ssl23_clnt.c.  I'm not sure if this is
the problem I've been trying to fix or not but it is potentially dangerous.  Here's
the code:

...
    if ((buf=BUF_MEM_new()) == NULL)
     {
     ret= -1;
     goto end;
     }
    if (!BUF_MEM_grow(buf,SSL3_RT_MAX_PLAIN_LENGTH))
     {
     ret= -1;
     goto end;
     }
...

The stack pointer "buf" never gets freed if "BUF_MEM_grow()" fails.
The same coding error exists in s2_clnt.c ssl2_connect() and in
s3_clnt.c ssl3_connect().

Please let me know if there's anything I can do for you,

Mark P. Peterson - Vice President
http://www.RhinoSoft.com
Voice: +1(262) 560-9627
FAX: +1(262) 560-9628

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to