Conversation

CVE-2021-3450 is kinda delightful because it was introduced by a change that rejects custom curve parameters (which is what broke Windows last year), and it only affects X509_V_FLAG_X509_STRICT mode. Complexity is killer.
5
62
CVE-2021-3449 looks like it could have been found easily if anyone figured out how to fuzz renegotiation, but renegotiation is sadness. Anyway, sounds like you can crash most OpenSSL servers on the Internet today.
7
67
Replying to and
You certainly need sustained and repeated requests against such a service (and generally when the attack stops they'd recover). But of course any server not designed to handle child crashes could be a DoS from a single request.
1
DoS is a lot better than RCE. An exploit with a small chance of success due to probabilistic mitigations and other obstacles is a lot scarier with this kind of architecture. That's particularly true when the processes are spawned with fork rather than fork + exec. It's not ideal.