diff options
author | Benjamin Kaduk <kaduk@mit.edu> | 2020-04-10 21:27:28 +0200 |
---|---|---|
committer | Matt Caswell <matt@openssl.org> | 2020-04-21 14:32:35 +0200 |
commit | a87f3fe01a5a894aa27ccd6a239155fd129988e4 (patch) | |
tree | ab00b1ad51883e834495650f115ec2e8f9d1cc37 /ssl/t1_lib.c | |
parent | Add test for CVE-2020-1967 (diff) | |
download | openssl-a87f3fe01a5a894aa27ccd6a239155fd129988e4.tar.xz openssl-a87f3fe01a5a894aa27ccd6a239155fd129988e4.zip |
Fix NULL dereference in SSL_check_chain() for TLS 1.3
In the tls1_check_sig_alg() helper function, we loop through the list of
"signature_algorithms_cert" values received from the client and attempt
to look up each one in turn in our internal table that maps wire
codepoint to string-form name, digest and/or signature NID, etc., in
order to compare the signature scheme from the peer's list against what
is used to sign the certificates in the certificate chain we're
checking. Unfortunately, when the peer sends a value that we don't
support, the lookup returns NULL, but we unconditionally dereference the
lookup result for the comparison, leading to an application crash
triggerable by an unauthenticated client.
Since we will not be able to say anything about algorithms we don't
recognize, treat NULL return from lookup as "does not match".
We currently only apply the "signature_algorithm_cert" checks on TLS 1.3
connections, so previous TLS versions are unaffected. SSL_check_chain()
is not called directly from libssl, but may be used by the application
inside a callback (e.g., client_hello or cert callback) to verify that a
candidate certificate chain will be acceptable to the client.
CVE-2020-1967
Reviewed-by: Matt Caswell <matt@openssl.org>
Diffstat (limited to 'ssl/t1_lib.c')
-rw-r--r-- | ssl/t1_lib.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/ssl/t1_lib.c b/ssl/t1_lib.c index b9b3a60252..79f66601be 100644 --- a/ssl/t1_lib.c +++ b/ssl/t1_lib.c @@ -2259,7 +2259,7 @@ static int tls1_check_sig_alg(SSL *s, X509 *x, int default_nid) sigalg = use_pc_sigalgs ? tls1_lookup_sigalg(s->s3.tmp.peer_cert_sigalgs[i]) : s->shared_sigalgs[i]; - if (sig_nid == sigalg->sigandhash) + if (sigalg != NULL && sig_nid == sigalg->sigandhash) return 1; } return 0; |