CRYPTO_malloc is an internally-used function, to allocate memory.  In any 
event, though, do you do an earlier CRYPTO_malloc_init?

http://openssl.org/support/faq.html#PROG2

-Kyle H

On Thu, Oct 29, 2009 at 11:23 AM, Josue Andrade Gomes 
<josue.gomes.honey...@gmail.com> wrote:
Hi,

Shortly: HP Insight Manager (a management tool) crashes my server SSL
application.
Operating system: Windows 2003 Server
OpenSSL version: 0.9.8k
Post-mortem debugger points the crash ocurring in a call to
CRYPTO_malloc() inside SSLv3_client_method()
(wich is weird since I never call this function).

Any idea? Have someone seen this already?

regards,
josue

The packet that causes the crash:

No.     Time        Source                Destination           Protocol Info
 34446 117.798401  <removed> <removed>           SSL      Client Hello

Frame 34446 (164 bytes on wire, 164 bytes captured)
   Arrival Time: Oct 29, 2009 08:03:37.301438000
   [Time delta from previous captured frame: 0.000602000 seconds]
   [Time delta from previous displayed frame: 0.000602000 seconds]
   [Time since reference or first frame: 117.798401000 seconds]
   Frame Number: 34446
   Frame Length: 164 bytes
   Capture Length: 164 bytes
   [Frame is marked: False]
   [Protocols in frame: eth:ip:tcp:ssl]
   [Coloring Rule Name: TCP]
   [Coloring Rule String: tcp]
Ethernet II, Src: HewlettP_68:24:67 (00:0b:cd:68:24:67), Dst:
Vmware_9a:54:7d (00:50:56:9a:54:7d)
   Destination: Vmware_9a:54:7d (00:50:56:9a:54:7d)
       Address: Vmware_9a:54:7d (00:50:56:9a:54:7d)
       .... ...0 .... .... .... .... = IG bit: Individual address (unicast)
       .... ..0. .... .... .... .... = LG bit: Globally unique
address (factory default)
   Source: HewlettP_68:24:67 (00:0b:cd:68:24:67)
       Address: HewlettP_68:24:67 (00:0b:cd:68:24:67)
       .... ...0 .... .... .... .... = IG bit: Individual address (unicast)
       .... ..0. .... .... .... .... = LG bit: Globally unique
address (factory default)
   Type: IP (0x0800)
Internet Protocol, Src: <removed>, Dst: <removed>
   Version: 4
   Header length: 20 bytes
   Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
       0000 00.. = Differentiated Services Codepoint: Default (0x00)
       .... ..0. = ECN-Capable Transport (ECT): 0
       .... ...0 = ECN-CE: 0
   Total Length: 150
   Identification: 0x65e7 (26087)
   Flags: 0x04 (Don't Fragment)
       0... = Reserved bit: Not set
       .1.. = Don't fragment: Set
       ..0. = More fragments: Not set
   Fragment offset: 0
   Time to live: 128
   Protocol: TCP (0x06)
   Header checksum: 0x3a0b [correct]
       [Good: True]
       [Bad : False]
   Source: <removed>
   Destination:<removed>
Transmission Control Protocol, Src Port: cas-mapi (3682), Dst Port:
https (443), Seq: 1, Ack: 1, Len: 110
   Source port: cas-mapi (3682)
   Destination port: https (443)
   [Stream index: 64]
   Sequence number: 1    (relative sequence number)
   [Next sequence number: 111    (relative sequence number)]
   Acknowledgement number: 1    (relative ack number)
   Header length: 20 bytes
   Flags: 0x18 (PSH, ACK)
       0... .... = Congestion Window Reduced (CWR): Not set
       .0.. .... = ECN-Echo: Not set
       ..0. .... = Urgent: Not set
       ...1 .... = Acknowledgement: Set
       .... 1... = Push: Set
       .... .0.. = Reset: Not set
       .... ..0. = Syn: Not set
       .... ...0 = Fin: Not set
   Window size: 65535
   Checksum: 0xc791 [validation disabled]
       [Good Checksum: False]
       [Bad Checksum: False]
   [SEQ/ACK analysis]
       [Number of bytes in flight: 110]
Secure Socket Layer
   SSL Record Layer: Handshake Protocol: Client Hello
       Content Type: Handshake (22)
       Version: TLS 1.0 (0x0301)
       Length: 105
       Handshake Protocol: Client Hello
           Handshake Type: Client Hello (1)
           Length: 101
           Version: TLS 1.0 (0x0301)
           Random
               gmt_unix_time: Oct 29, 2009 08:03:37.000000000
               random_bytes:
E2103A68F025B061AF0FFB9DDF45E62EA52724CDE47FEE79...
           Session ID Length: 32
           Session ID: D2D7B8577F842D69A074F3F90ABD2AE9BF979E78DB2E6631...
           Cipher Suites Length: 30
           Cipher Suites (15 suites)
               Cipher Suite: TLS_RSA_WITH_RC4_128_MD5 (0x0004)
               Cipher Suite: TLS_RSA_WITH_RC4_128_SHA (0x0005)
               Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA (0x002f)
               Cipher Suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA (0x0033)
               Cipher Suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA (0x0032)
               Cipher Suite: TLS_RSA_WITH_3DES_EDE_CBC_SHA (0x000a)
               Cipher Suite: TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (0x0016)
               Cipher Suite: TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA (0x0013)
               Cipher Suite: TLS_RSA_WITH_DES_CBC_SHA (0x0009)
               Cipher Suite: TLS_DHE_RSA_WITH_DES_CBC_SHA (0x0015)
               Cipher Suite: TLS_DHE_DSS_WITH_DES_CBC_SHA (0x0012)
               Cipher Suite: TLS_RSA_EXPORT_WITH_RC4_40_MD5 (0x0003)
               Cipher Suite: TLS_RSA_EXPORT_WITH_DES40_CBC_SHA (0x0008)
               Cipher Suite: TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA (0x0014)
               Cipher Suite: TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA (0x0011)
           Compression Methods Length: 1
           Compression Methods (1 method)
               Compression Method: null (0)

0000  00 50 56 9a 54 7d 00 0b cd 68 24 67 08 00 45 00   .PV.T}...h$g..E.
0010  00 96 65 e7 40 00 80 06 3a 0b ac 10 01 0e ac 10   ....@...:.......
0020  01 41 0e 62 01 bb bb 16 43 ed 69 b8 1e 71 50 18   .A.b....C.i..qP.
0030  ff ff c7 91 00 00 16 03 01 00 69 01 00 00 65 03   ..........i...e.
0040  01 4a e9 68 79 e2 10 3a 68 f0 25 b0 61 af 0f fb   .J.hy..:h.%.a...
0050  9d df 45 e6 2e a5 27 24 cd e4 7f ee 79 18 bb de   ..E...'$....y...
0060  5d 20 d2 d7 b8 57 7f 84 2d 69 a0 74 f3 f9 0a bd   ] ...W..-i.t....
0070  2a e9 bf 97 9e 78 db 2e 66 31 64 14 ef 60 47 96   *....x..f1d..`G.
0080  43 7a 00 1e 00 04 00 05 00 2f 00 33 00 32 00 0a   Cz......./.3.2..
0090  00 16 00 13 00 09 00 15 00 12 00 03 00 08 00 14   ................
00a0  00 11 01 00                                       ....
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-us...@openssl.org
Automated List Manager                           majord...@openssl.org


Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

Reply via email to