diff options
author | Guy Harris <guy@alum.mit.edu> | 2017-02-03 16:56:57 -0800 |
---|---|---|
committer | Denis Ovsienko <denis@ovsienko.info> | 2017-09-13 12:25:44 +0100 |
commit | 6f5ba2b651cd9d4b7fa8ee5c4f94460645877c45 (patch) | |
tree | 286d10fcbad1f40ac4163fd6bef48e74e6a96adc /addrtoname.c | |
parent | c6e0531b5def26ecf912e8de6ade86cbdaed3751 (diff) | |
download | tcpdump-6f5ba2b651cd9d4b7fa8ee5c4f94460645877c45.tar.gz |
CVE-2017-12893/SMB/CIFS: Add a bounds check in name_len().
After we advance the pointer by the length value in the buffer, make
sure it points to something in the captured data.
This fixes a buffer over-read discovered by Forcepoint's security
researchers Otto Airamo & Antti Levomäki.
Add a test using the capture file supplied by the reporter(s).
Diffstat (limited to 'addrtoname.c')
0 files changed, 0 insertions, 0 deletions