SSL: OpenSSL tls_get_message_body Function init_msg Structure Use After Free
This signature detects attempts to exploit a known vulnerability in the tls_get_message_body function of OpenSSL. Successful exploitation allows the attacker to execute arbitrary code under the security context of the application using the vulnerable version of OpenSSL.
Extended Description
statem/statem.c in OpenSSL 1.1.0a does not consider memory-block movement after a realloc call, which allows remote attackers to cause a denial of service (use-after-free) or possibly execute arbitrary code via a crafted TLS session.
Affected Products
Openssl openssl
References
CVE: CVE-2016-6309
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Openssl
10.0