]> git.ipfire.org Git - thirdparty/asterisk.git/commit
AST-2013-001: Prevent buffer overflow through H.264 format negotiation
authorMatthew Jordan <mjordan@digium.com>
Wed, 27 Mar 2013 14:27:43 +0000 (14:27 +0000)
committerMatthew Jordan <mjordan@digium.com>
Wed, 27 Mar 2013 14:27:43 +0000 (14:27 +0000)
commit15e279d7e52846f8c710a5dc465381aa4bd1effa
tree0f78ae2e96018f2007f29a68c30aa502ce1ea6a9
parentc8800675ae04e1bd08513c8576d9146e114b1f7b
AST-2013-001: Prevent buffer overflow through H.264 format negotiation

The format attribute resource for H.264 video performs an unsafe read against a
media attribute when parsing the SDP. The value passed in with the format
attribute is not checked for its length when parsed into a fixed length buffer.
This patch resolves the vulnerability by only reading as many characters from
the SDP value as will fit into the buffer.

(closes issue ASTERISK-20901)
Reported by: Ulf Harnhammar
patches:
  h264_overflow_security_patch.diff uploaded by jrose (License 6182)
........

Merged revisions 383973 from http://svn.asterisk.org/svn/asterisk/branches/11

git-svn-id: https://origsvn.digium.com/svn/asterisk/certified/branches/11.2@383974 65c4cc65-6c06-0410-ace0-fbb531ad65f3
res/res_format_attr_h264.c