The tlsdecryptticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "1.0.1"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1a"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1b"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1c"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1d"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1e"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1f"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1g"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1h"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1i"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1j"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1k"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1l"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1m"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1n"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1o"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1p"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1q"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1r"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1s"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1t"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2a"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2b"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2c"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2d"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2e"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2f"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2g"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2h"
},
{
"introduced": "0"
},
{
"last_affected": "6"
},
{
"introduced": "0"
},
{
"last_affected": "7"
},
{
"introduced": "0"
},
{
"last_affected": "10"
}
]
}