Re: OpenSSL bufffer overflow

看板FB_security作者時間18年前 (2007/10/06 00:22), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串6/7 (看更多)
On 2007.10.03 19:49:31 -0400, Mike Tancsa wrote: > At 05:43 PM 9/28/2007, Stefan Esser wrote: >> I did not see any commits to the OpenSSL code, recently; is anybody >> going to commit the fix? >> >> See http://www.securityfocus.com/archive/1/480855/30/0 for details ... > > How serious is this particular issue ? Is it easily exploitable, or > difficult to do ? Are some apps more at risk of exploitation than others ? > e.g. ssh,apache ? (/me kicks mutt again for not showing new mails in mailboxes...) Anyway, I don't think it's very likely many people are affected by this since not many programs call SSL_get_shared_ciphers(). No application in the base system calls SSL_get_shared_ciphers acording to grep, other than openssl(1)'s built in ssl client/server. I also did a quick grep in apache 2.2 (I think it was 2.2) and it didn't reference the function either, but this was a quick check so if it matters to anyone, check yourself. -- Simon L. Nielsen FreeBSD Security Team _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #171cJW00 (FB_security)
文章代碼(AID): #171cJW00 (FB_security)