BF Specification of CVE-2014-0160 Heartbleed Heap Buffer Over-Read in OpenSSL v1.0.1 before v1.0.1g

../../../../BF/images/BFCVE/CVE-2014-0160(simple)-0.png
Missing verification of 'payload' towards a upper limit leads to use of an inconsistent size for an object, allowing a pointer reposition over its bounds, which, when used in 'memcpy()' leads to a heap buffer over-read. If exploited, this can lead to exposure of sensitive information (IEX) – confidentiality loss.

//generated// Missing Code (in ‘dtls1_process_heartbeat(SSL *s)’) to Range Verify length (1 + 2 + 16 <= s->s3->rrec.length 1 + 2 + payload + 16 <= s->s3->rrec.length) Transferred (via network) in Third-Party (ssl/d1_both.c#L1462 ssl/t1_lib.c#L2591) Local leads to Inconsistent Value (‘payload’)

, which propagates to Wrong Size (in ‘memcpy(bp, pl, payload)’) Sequential Reposition (pointer) Heap Used (for s→s3→rrec.data[0]) Third-Party (ssl/d1_both.c#L1487 ssl/t1_lib.c#L2620) in Userland that results in Overbound Pointer (‘pl’)

, which propagates to Overbound Pointer (in ‘memcpy(bp, pl, payload)’) Sequential Read (object) Used Huge (up to 64kb per exploit) Heap Third-Party (ssl/d1_both.c#L1487 ssl/t1_lib.c#L2620) in Userland that results in Buffer Over-Read (‘bp’)

, which can be exploited toward IEX (confidentiality loss) security failure.



vendor:product: openssl:openssl


Bug Report


Code with Bug


Code with Fix


NVD Entry

ClassDefinition
DVRData Verification (DVR) class – Data are verified (i.e., semantics check) or corrected (i.e., assign or remove) improperly.
MADMemory Addressing (MAD) class – The pointer to an object is initialized, dereferenced, repositioned, or reassigned to an improper memory address.
MUSMemory Use (MUS) class – An object is initialized, read, written, or cleared improperly.
OperationDefinition
VerifyVerify operation – Check data semantics (e.g., proper value/meaning) in order to accept (and possibly correct) or reject it.
RepositionReposition operation – Change the pointer to another position inside its object.
ReadRead operation – Retrieve the data value of an object from memory.
Cause/ConsequenceDefinition
Code BugCode Bug type – An error in the implementation of an operation – proper operands over an improper operation. It is the roor cause of a security vulnerability. Must be fixed to resolve the vulnerability.
   Missing CodeMissing Code bug - The operation is misplaced entirely absent.
Data Error/FaultData Fault/Error type – The data of an object has harmed semantics or inconsistent or wrong value.
   Inconsistent ValueInconsistent Value fault/error – The data value does not correspond to related data value (e.g., inconstancy between the value of a size variable and the actual buffer size).
   Wrong SizeWrong Size fault/error – The value used as size or length (i.e., the number of elements) does not match the object's memory size or length (e.g., to limit a pointer reposition or index increment/decrement in a repetition statement).
Address Error/FaultAddress Fault/Error type – The address of an object is wrong.
   Overbound PointerOverbound Pointer fault/error – Holds an address that is above the upper boundary of its object.
Memory Corruption/Disclosure Final ErrorMemory Corruption/Disclosure final error type – An exploitable or undefined system behavior caused by memory addressing, allocation, use, or deallocation bugs.
   Buffer Over-ReadBuffer Over-Read final error – Read data above the upper bound of an object.
Operation AttributeDefinition
MechanismMechanism operation attribute type – Shows how the operation the operation with a bug or faulty operand is performed.
   RangeRange operation attribute – The operation checks data are within a (min, max) interval.
   SequentialSequential operation attribute – The operation is via iterating over the object elements.
Source CodeSource Code operation attribute type – Shows where the code of the operation with a bug or faulty operand resides within the software, firmware, or hardware.
   Third-PartyThird-Party operation attribute – The operation code is in a third-party source.
Execution SpaceExecution Space operation attribute type – Shows where the operation with a bug or faulty operand is executed and the privilege level at which it runs.
   LocalLocal operation attribute – The bugged code runs in an environment with access control policy with limited (local user) permission.
   UserlandUserland operation attribute – The bugged code runs in an environment with privilege levels, but in unprivileged mode (e.g., ring 3 in x86 architecture).
Operand AttributeDefinition
Data StateData State operand attribute type – Shows where the data comes from.
   TransferredTransferred operand attribute – Data are from another device via a network (e.g., connecting analog device or another computer).
Address StateAddress State operand attribute type – Shows where the address is (i.e., its location) in the memory layout.
   HeapThe object is a dynamically allocated data structure (e.g., via malloc() and new).
Size KindSize Kind operand attribute type – Shows what is used as the size or length (i.e., the number of elements) of an object - e.g., as the limit for traversal over the elements.
   UsedUsed operand attribute – A supplied value to be used as the size or length (i.e., the number of elements) of an object.
Address KindAddress Kind operand attribute type - Shows how much memory is accessed (i.e., the span) outside of a bound of an object.
   HugeMore than 1KB of memory is accessed.