aboutsummaryrefslogtreecommitdiffstats
path: root/ChangeLog
diff options
context:
space:
mode:
authorLev Walkin <vlm@lionet.info>2004-10-05 06:39:35 +0000
committerLev Walkin <vlm@lionet.info>2004-10-05 06:39:35 +0000
commit6d67d91c5d93f9a4eea53b49c57b2fcf6a96232a (patch)
tree9dc716bb32e50cd96dd248a4ef37d238749ea608 /ChangeLog
parent237dc24db348d90065ce1e287a08bdf63c28940b (diff)
SEQUENCE and CHOICE fixes, plus security terms descriptions
Diffstat (limited to 'ChangeLog')
-rw-r--r--ChangeLog34
1 files changed, 33 insertions, 1 deletions
diff --git a/ChangeLog b/ChangeLog
index 42331026..37bae2f9 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,5 +1,5 @@
-0.9.7: 2004-Oct-03
+0.9.7: 2004-Oct-04
* Finished CANONICAL-XER implementation by adding SET and SET OF
canonical ordering support.
@@ -7,6 +7,12 @@
* Removed C99'izm from the x509dump, now understood by older compilers.
* Enhanced UTF8String constraint validation, now it checks
for the minimal encoding length; API of UTF8String_length() changed.
+ * Fixed SEQUENCE dealing with premature termination of the
+ optionals-laden indefinite length structure. The code was previously
+ refusing to parse such structures.
+ * Fixed CHOICE code spin when indefinite length structures appear
+ in the extensions (Severity: medium, Security impact: medium).
+ Reported by <siden@ul-gsm.ru>.
0.9.6: 2004-Sep-29
@@ -289,3 +295,29 @@
0.1: 2003-Nov-28
* Programming started.
+
+=== Bug importance disclosure terms ===
+
+SEVERITY.
+ This term applies to the frequence the particular construct is used
+ in the real world. The higher the frequency, the more chances of triggering
+ this bug.
+ low: The ASN.1 specifications which could trigger
+ this kind of bug are not widespread.
+ medium: The particular ASN.1 construct is used quite often,
+ so the chance of triggering an error is considerable.
+ high: This fix is considered urgent, or the particular ASN.1
+ construct triggering this bug is in wide use.
+
+SECURITY IMPACT.
+ This term applies to the amount of potential damage a bug exploitation
+ could cause.
+ low: The local exploitation is unlikely; the remote exploitation
+ is impossible.
+ medium: The remote exploitation is possible when a particular ASN.1
+ construct is being used. If possible, only hard failure, spin
+ or memory leak are the possible outcome: no shellcode
+ injection could possibly be carried by the attack.
+ high: The remote shellcode injection is possible, or the bug is
+ otherwise remotely exploitable for most specifications.
+