Description
- Type: Out of bound pointer
- Priority: High
- The bug affects the develop branch
- This affects the processing of the messages on the client-side.
How to trigger

Upon receipt of a Certificate Request message, if the message is maliciously crafted in a way that the value of the Certificate Types Count and Signature Hash Algorithms Length are not within the boundary of the Fragment Length, three out-of-bound pointer de-reference occurs in the following three points:
- https://github.com/eclipse/tinydtls/blob/main/dtls.c#L3529
- https://github.com/eclipse/tinydtls/blob/main/dtls.c#L3531
- https://github.com/eclipse/tinydtls/blob/main/dtls.c#L3508
My suggestion:
There should always be a check that ensures that the fields that represent the size of fields are within the boundary of data_length.
Description
How to trigger
Upon receipt of a Certificate Request message, if the message is maliciously crafted in a way that the value of the
Certificate Types CountandSignature Hash Algorithms Lengthare not within the boundary of theFragment Length, three out-of-bound pointer de-reference occurs in the following three points:My suggestion:
There should always be a check that ensures that the fields that represent the size of fields are within the boundary of data_length.