Remote client memory corruption in ssl_add_clienthello_tlsext()
Unknown
Vulnerability Details
https://guidovranken.wordpress.com/2016/10/13/openssl-1-1-0-remote-client-memory-corruption-in-ssl_add_clienthello_tlsext/
OpenSSL is not treating this as a security vulnerability because 1) session tickets need to be enabled 2) request certificate status from server 3) an unrealistically large ALPN list set.
Reporting this for reputation points.
Actions
View on HackerOneReport Stats
- Report ID: 175766
- State: Closed
- Substate: resolved
- Upvotes: 6