mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2025-11-20 01:02:18 +03:00
In ssl_parse_hello_verify_request, we read 3 bytes (version and cookie length) without checking that there are that many bytes left in ssl->in_msg. This could potentially read from memory outside of the ssl->receive buffer (which would be a remotely exploitable crash).
136 KiB
136 KiB