Skip to content

Server denial-of-service by using sslv2 message format in a HelloRetryRequest handshake

Low
camshaft published GHSA-mm47-wjfh-4hf5 Sep 27, 2022

Package

s2n-tls (GitHub)

Affected versions

< v1.3.23

Patched versions

< v1.3.23

Description

If a TLS1.3 enabled s2n-tls server receives an sslv2 ClientHello format message in a HelloRetryRequest handshake, the server may restart due to a NULL pointer dereference.

Applications using s2n are expected to restart following a NULL pointer dereference, and client applications may also retry requests. No AWS service was impacted by this issue and AWS customers do not need to take any action. s2n-tls users who enabled TLS1.3 in their applications should update to the most recent s2n-tls version.

All versions of s2n-tls from commit 3973821 through commit c947a22 are affected by this issue.
Affected s2n-tls users should fetch s2n-tls commit 8cf81d3.

Severity

Low

CVE ID

No known CVE

Weaknesses

No CWEs