An issue was discovered in app-layer-ssl.c in Suricata 4.1.4. Upon receiving a corrupted SSLv3 (TLS 1.2) packet, the parser function TLSDecodeHSHelloExtensions tries to access a memory region that is not allocated, because the expected length of HSHelloExtensions does not match the real length of the HSHelloExtensions part of the packet.
{
"binaries": [
{
"binary_version": "3.2-2ubuntu3",
"binary_name": "libhtp-0.5.23-1"
},
{
"binary_version": "3.2-2ubuntu3",
"binary_name": "suricata"
},
{
"binary_version": "3.2-2ubuntu3",
"binary_name": "suricata-hyperscan"
},
{
"binary_version": "3.2-2ubuntu3",
"binary_name": "suricata-oinkmaster"
}
]
}