+2005-03-28 Tom Yu <tlyu@mit.edu>
+
+ * telnet.c (slc_add_reply, slc_end_reply): Fix buffer overflow
+ vulnerability by checking lengths.
+ (env_opt_add): Ensure buffer allocation is sufficiently large,
+ accounting for expansion during IAC quoting.
+
2004-03-04 Ken Raeburn <raeburn@mit.edu>
* configure.in: Deleted; configure this dir from parent now.
unsigned char flags;
cc_t value;
{
+ if ((slc_replyp - slc_reply) + 6 > sizeof(slc_reply))
+ return;
if ((*slc_replyp++ = func) == IAC)
*slc_replyp++ = IAC;
if ((*slc_replyp++ = flags) == IAC)
{
register int len;
- *slc_replyp++ = IAC;
- *slc_replyp++ = SE;
len = slc_replyp - slc_reply;
- if (len <= 6)
+ if (len <= 4 || (len + 2 > sizeof(slc_reply)))
return;
+ *slc_replyp++ = IAC;
+ *slc_replyp++ = SE;
+ len += 2;
if (NETROOM() > len) {
ring_supply_data(&netoring, slc_reply, slc_replyp - slc_reply);
printsub('>', &slc_reply[2], slc_replyp - slc_reply - 2);
register unsigned char *ep;
{
register unsigned char *vp, c;
+ unsigned int len, olen, elen;
if (opt_reply == NULL) /*XXX*/
return; /*XXX*/
return;
}
vp = env_getvalue(ep);
- if (opt_replyp + (vp ? strlen((char *)vp) : 0) +
- strlen((char *)ep) + 6 > opt_replyend)
+ elen = 2 * (vp ? strlen((char *)vp) : 0) +
+ 2 * strlen((char *)ep) + 6;
+ if ((opt_replyend - opt_replyp) < elen)
{
- register unsigned int len;
- opt_replyend += OPT_REPLY_SIZE;
- len = opt_replyend - opt_reply;
+ len = opt_replyend - opt_reply + elen;
+ olen = opt_replyp - opt_reply;
opt_reply = (unsigned char *)realloc(opt_reply, len);
if (opt_reply == NULL) {
/*@*/ printf("env_opt_add: realloc() failed!!!\n");
opt_reply = opt_replyp = opt_replyend = NULL;
return;
}
- opt_replyp = opt_reply + len - (opt_replyend - opt_replyp);
+ opt_replyp = opt_reply + olen;
opt_replyend = opt_reply + len;
}
if (opt_welldefined((char *) ep))