Skip to content

Server denial-of-service via crafted handshake message

Low
agray256 published GHSA-j875-5qwx-w645 Oct 12, 2020

Package

s2n

Affected versions

< v0.10.19

Patched versions

v0.10.19

Description

NULL pointer dereference in s2n_handshake_read_io()

Server or client applications that receive an application data message in the final handshake record before the TLS handshake is complete will crash due to a NULL pointer dereference. To exploit this issue, an adversary must go through a full handshake sequence and send a handcrafted TLS record to trigger a remote crash of the application.

Applications using s2n are expected to restart following a NULL pointer dereference, and client applications may also retry requests. No AWS service was impacted by this issue and AWS customers do not need to take any action.

All versions of s2n through commit 0df8de3 are affected by this issue.

Affected s2n users should fetch s2n commit b74b955.

Severity

Low

CVE ID

No known CVE

Weaknesses

No CWEs