From: Me [mailto:ugobejishv...@gmail.com] Sent: Monday, April 14, 2014 7:34 AM > > possible vulnerable file: openssl-1.0.1g/ssl/d1_clnt.c > Line: 155 unsigned char sctpauthkey[64]; > > fixed sized arrays can be overflowed.
True, but only because ALL arrays can be overflowed no matter how they are sized or allocated. > To fix the problem What problem? > use functions that limit length, or ensure that the size is > larger than the maximum possible length. So show us the problem. What code accesses this array without either: - explicitly limiting the length to the length of this array; or - never accessing more than 64 bytes? > It's avoid us attack like buffer overflow! To avoid buffer overflow attacks, the code must never overflow buffers. The sizes of the buffers and the ways they are allocated are not directly relevant. ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager majord...@openssl.org