bk: 5492d353ncauuWt_PONxaDhC5Qv_SA
* [Sec 2668] buffer overflow in ctl_putdata().
* [Sec 2669] buffer overflow in configure().
* [Sec 2670] Missing return; from error clause.
+* [Sec 2671] vallen in extension fields are not validated.
* [Sec 2672] On some OSes ::1 can be spoofed, bypassing source IP ACLs.
(4.2.7p486-RC) 2014/12/18 Released by Harlan Stenn <stenn@ntp.org>
* [Bug 2687] RefClock 26/hpgps doesn't work at default line speed
*/
authlen = LEN_PKT_NOMAC;
has_mac = rbufp->recv_length - authlen;
- while (has_mac != 0) {
+ while (has_mac > 0) {
u_int32 len;
#ifdef AUTOKEY
u_int32 hostlen;
}
}
+ /*
+ * If has_mac is < 0 we had a malformed packet.
+ */
+ if (has_mac < 0) {
+ sys_badlength++;
+ return; /* bad length */
+ }
+
/*
* If authentication required, a MAC must be present.
*/