Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Good to note that this was found with KLEE[1]. KLEE is a good for symbolic execution of code and is very cool[2].

This only triggers a crash if you use RELEASE_BUFFERS (not the default) and a warning alert is written when the socket buffer is full. About the only case where a warning alert is generated is when a client attempts a renegotiation without the renegotiation extension (unless insecure renegotiation is allowed by the app). I've not been able to trigger the bug in a test because code generally stops reading once the socket buffer is full so you need the application to exactly fill the socket buffer (so that it doesn't get EAGAIN), then a warning alert can just exceed it.

[1] http://marc.info/?l=openssl-dev&m=139809493725682&w=2 [2] http://klee.github.io/klee/



KLEE is ok on small programs but has a lot of limitation with real world programs (using libraries mostly) at least according to a USENIX paper last year: https://www.usenix.org/conference/cset13/workshop-program/pr...


How does what you say square with the evidence that klee found a bug in OpenSSL which is about as real world as it gets?


KLEE is very interesting! I am looking into it for improving tests on some of my company's small-but-tricky functions.

Here is an example of its power and how to use it: http://feliam.wordpress.com/2010/10/07/the-symbolic-maze/




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: