As i have understood the CVE, some malicios app in the internet:
- starts an SSL handshake with the target OpenSSL
- fatal error will be returned in the initial function call by the target OpenSSL
- SSL_read()/SSL_write() is subsequently called by the malicios application for the same SSL object
- then it will succeed and the data is passed without being decrypted/encrypted directly from the SSL/TLS record layer
The possibilty for IPS is to either filter direct calls to SSL_read()/SSL_write() (this might lead to issues with software using them) or suppress the fatal error (also not a behaviour that is wanted).
CCSP - CCSE / CCTE / CTPS / CCME / CCSM Elite / SMB Specialist