2nd try : REGD : openssl vulnerability CVE-2010-2939 : double in ssl3_get_key_exchange

2010-09-23 Thread Aparajita Sood (apsood)
Would be great if I can get answers to the below questions
 
thanks
aparajita


From: Aparajita Sood (apsood) 
Sent: Tuesday, September 21, 2010 11:54 AM
To: 'openssl-users@openssl.org'
Subject: REGD : openssl vulnerability CVE-2010-2939 : double in
ssl3_get_key_exchange


Hi OpenSSL Folks,
 
I'm evaluating our product for this vulnerability.
http://www.mail-archive.com/openssl-...@openssl.org/msg28049.html
http://www.mail-archive.com/openssl-...@openssl.org/msg28049.html 
 
I have a few questions :
 
1. The vulnerability says
 You are right : there is a double free bug in the function 
 *ssl3_get_key_exchange* which leads to crash if an error occurs.
 The bug is in line 1510 of s3_clnt.c where we forget to set the
 variable bn_ctx to NULL after freeing it and this leads to the
 double free error when BN_CTX_free is called a second time on line
 1650. 
 

In 0.9.7d and prior I see no reference to bn_ctx or BN_CTX_free
 
QUESTION:  Since I do not see references to bn_ctx or BN_CTX_free in
0.9.7d can I assume that the vulnerability does not exist on that
version?
 
2. The link says  OpenSSL versions 1.0.0a, 0.9.8, 0.9.7,
 and possibly other versions, are affected when Elliptic curve
 Diffie-Hellman (ECDH) is enabled
 
QUESTION: Since I don't see BN_CTX_free being used in 0.9.7d and  prior,
do they mean that 7e, f , g have these definitions ?

3. I checked in the opensslconf.h file for #define OPENSSL_NO_ECDH to
check if ECDH is enabled or not 

QUESTION: is this the correct way to find if ecdh is enabled or not?
 
Would be great if I can get a response to these 
 
thanks
aparajita



REGD : openssl vulnerability CVE-2010-2939 : double in ssl3_get_key_exchange

2010-09-22 Thread Aparajita Sood (apsood)
Hi OpenSSL Folks,
 
I'm evaluating our product for this vulnerability.
http://www.mail-archive.com/openssl-...@openssl.org/msg28049.html
http://www.mail-archive.com/openssl-...@openssl.org/msg28049.html 
 
I have a few questions :
 
1. The vulnerability says
 You are right : there is a double free bug in the function 
 *ssl3_get_key_exchange* which leads to crash if an error occurs.
 The bug is in line 1510 of s3_clnt.c where we forget to set the
 variable bn_ctx to NULL after freeing it and this leads to the
 double free error when BN_CTX_free is called a second time on line
 1650. 
 

In 0.9.7d and prior I see no reference to bn_ctx or BN_CTX_free
 
QUESTION:  Since I do not see references to bn_ctx or BN_CTX_free in
0.9.7d can I assume that the vulnerability does not exist on that
version?
 
2. The link says  OpenSSL versions 1.0.0a, 0.9.8, 0.9.7,
 and possibly other versions, are affected when Elliptic curve
 Diffie-Hellman (ECDH) is enabled
 
QUESTION: Since I don't see BN_CTX_free being used in 0.9.7d and  prior,
do they mean that 7e, f , g have these definitions ?

3. I checked in the opensslconf.h file for #define OPENSSL_NO_ECDH to
check if ECDH is enabled or not 

QUESTION: is this the correct way to find if ecdh is enabled or not?
 
Would be great if I can get a response to these 
 
thanks
aparajita