aboutsummaryrefslogtreecommitdiffstats
path: root/security/krb5/files
diff options
context:
space:
mode:
authorcy <cy@FreeBSD.org>2002-10-24 06:30:39 +0800
committercy <cy@FreeBSD.org>2002-10-24 06:30:39 +0800
commitefe76396595177c9b208cdd82ac4acf3ed8c22bf (patch)
treedda644963c7200c2fffffed34bcc95ec8b81a9fe /security/krb5/files
parent47a2e59492c701c98b2be45cccc850552248649b (diff)
downloadfreebsd-ports-gnome-efe76396595177c9b208cdd82ac4acf3ed8c22bf.tar.gz
freebsd-ports-gnome-efe76396595177c9b208cdd82ac4acf3ed8c22bf.tar.zst
freebsd-ports-gnome-efe76396595177c9b208cdd82ac4acf3ed8c22bf.zip
Fix buffer overflow in kadmind4 (remote user can gain root access to
KDC host). Obtained from: Tom Yu <tlyu@mit.edu> on kerberos-announce mailing list, MIT krb5 Security Advisory 2002-002
Diffstat (limited to 'security/krb5/files')
-rw-r--r--security/krb5/files/patch-kadmin::v4server::kadm_ser_wrap.c26
1 files changed, 26 insertions, 0 deletions
diff --git a/security/krb5/files/patch-kadmin::v4server::kadm_ser_wrap.c b/security/krb5/files/patch-kadmin::v4server::kadm_ser_wrap.c
new file mode 100644
index 000000000000..2fa89e96690b
--- /dev/null
+++ b/security/krb5/files/patch-kadmin::v4server::kadm_ser_wrap.c
@@ -0,0 +1,26 @@
+--- kadmin/v4server/kadm_ser_wrap.c.orig Tue May 23 14:44:50 2000
++++ kadmin/v4server/kadm_ser_wrap.c Wed Oct 23 15:15:24 2002
+@@ -170,14 +170,21 @@
+ u_char *retdat, *tmpdat;
+ int retval, retlen;
+
+- if (strncmp(KADM_VERSTR, (char *)*dat, KADM_VERSIZE)) {
++ if ((*dat_len < KADM_VERSIZE + sizeof(krb5_ui_4))
++ || strncmp(KADM_VERSTR, (char *)*dat, KADM_VERSIZE)) {
+ errpkt(dat, dat_len, KADM_BAD_VER);
+ return KADM_BAD_VER;
+ }
+ in_len = KADM_VERSIZE;
+ /* get the length */
+- if ((retc = stv_long(*dat, &r_len, in_len, *dat_len)) < 0)
++ if ((retc = stv_long(*dat, &r_len, in_len, *dat_len)) < 0
++ || (r_len > *dat_len - KADM_VERSIZE - sizeof(krb5_ui_4))
++ || (*dat_len - r_len - KADM_VERSIZE -
++ sizeof(krb5_ui_4) > sizeof(authent.dat))) {
++ errpkt(dat, dat_len, KADM_LENGTH_ERROR);
+ return KADM_LENGTH_ERROR;
++ }
++
+ in_len += retc;
+ authent.length = *dat_len - r_len - KADM_VERSIZE - sizeof(krb5_ui_4);
+ memcpy((char *)authent.dat, (char *)(*dat) + in_len, authent.length);