From: Tom Yu Date: Thu, 9 May 2013 20:51:31 +0000 (-0400) Subject: Add test case for CVE-2013-1416 X-Git-Tag: krb5-1.12-alpha1~179 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=ab8aa580737d0283bf7cc1f71fa8d692a2ddd75c;p=thirdparty%2Fkrb5.git Add test case for CVE-2013-1416 ticket: 7635 (new) --- diff --git a/src/tests/Makefile.in b/src/tests/Makefile.in index 55a3237896..23684c0106 100644 --- a/src/tests/Makefile.in +++ b/src/tests/Makefile.in @@ -101,6 +101,7 @@ check-pytests:: gcred hist kdbtest t_localauth $(RUNPYTEST) $(srcdir)/t_kdb.py $(PYTESTFLAGS) $(RUNPYTEST) $(srcdir)/t_cve-2012-1014.py $(PYTESTFLAGS) $(RUNPYTEST) $(srcdir)/t_cve-2012-1015.py $(PYTESTFLAGS) + $(RUNPYTEST) $(srcdir)/t_cve-2013-1416.py $(PYTESTFLAGS) clean:: $(RM) gcred hist kdbtest krb5.conf kdc.conf t_localauth diff --git a/src/tests/t_cve-2013-1416.py b/src/tests/t_cve-2013-1416.py new file mode 100644 index 0000000000..94fb6d5ef1 --- /dev/null +++ b/src/tests/t_cve-2013-1416.py @@ -0,0 +1,15 @@ +#!/usr/bin/python + +from k5test import * + +realm = K5Realm() + +# CVE-2013-1416 KDC dereferences null pointer + +realm.kinit(realm.user_princ, password('user')) +realm.run([kvno, '/test'], expected_code=1) +realm.run([kvno, 'test/'], expected_code=1) +realm.run([kvno, '/'], expected_code=1) +# Make sure KDC is still running. +realm.kinit(realm.user_princ, password('user')) +success('CVE-2013-1416 regression test')