]> git.ipfire.org Git - thirdparty/samba.git/commitdiff
nmblib: avoid undefined behaviour in handle_name_ptrs()
authorDouglas Bagnall <douglas.bagnall@catalyst.net.nz>
Sun, 19 Jan 2020 02:08:58 +0000 (15:08 +1300)
committerKarolin Seeger <kseeger@samba.org>
Wed, 18 Mar 2020 16:19:59 +0000 (16:19 +0000)
If *offset is length - 1, we would read ubuf[(*offset)+1] as the lower
bits of the new *offset. This value is undefined, but because it is
checked against the valid range, there is no way to read further
beyond that one byte.

Credit to oss-fuzz.

BUG: https://bugzilla.samba.org/show_bug.cgi?id=14242
OSS-Fuzz: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20193

Signed-off-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
Reviewed-by: Jeremy Allison <jra@samba.org>
Reviewed-by: Andrew Bartlett <abartlet@samba.org>
Autobuild-User(master): Andrew Bartlett <abartlet@samba.org>
Autobuild-Date(master): Fri Feb  7 10:19:39 UTC 2020 on sn-devel-184

(cherry picked from commit 3bc7acc62646b105b03fd3c65e9170a373f95392)

Autobuild-User(v4-10-test): Karolin Seeger <kseeger@samba.org>
Autobuild-Date(v4-10-test): Wed Mar 18 16:19:59 UTC 2020 on sn-devel-144

source3/libsmb/nmblib.c

index 0681450bae2ed3c74d040c217d270452a4d124ef..8d387fe8120a2c549f8448c54cfab5172cb5838d 100644 (file)
@@ -160,6 +160,9 @@ static bool handle_name_ptrs(unsigned char *ubuf,int *offset,int length,
                if (!*got_pointer)
                        (*ret) += 2;
                (*got_pointer)=True;
+               if (*offset > length - 2) {
+                       return False;
+               }
                (*offset) = ((ubuf[*offset] & ~0xC0)<<8) | ubuf[(*offset)+1];
                if (loop_count++ == 10 ||
                                (*offset) < 0 || (*offset)>(length-2)) {