af7a454fd3
- MITKRB5-SA-2003-005: Buffer overrun and underrun in principal name handling - MITKRB5-SA-2003-004: Cryptographic weaknesses in Kerberos v4 protocol; KDC and realm compromise possible. - MITKRB5-SA-2003-003: Faulty length checks in xdrmem_getbytes may allow kadmind DoS. - Additional patches from RedHat. Approved by: kris (wearing his portmgr hat) Obtained from: MIT Website and Nalin Dahyabhai <nalin@redhat.com>
13 lines
450 B
C
13 lines
450 B
C
--- clients/ksu/krb_auth_su.c.orig Mon Dec 6 13:56:09 1999
|
|
+++ clients/ksu/krb_auth_su.c Tue Feb 25 19:54:14 2003
|
|
@@ -620,7 +620,9 @@
|
|
krb5_princ_realm(context, temp_client)->length))){
|
|
|
|
|
|
- if(nelem){
|
|
+ if(nelem &&
|
|
+ (krb5_princ_size(context, *client) > 0) &&
|
|
+ (krb5_princ_size(context, temp_client) > 0)){
|
|
krb5_data *p1 =
|
|
krb5_princ_component(context, *client, 0);
|
|
krb5_data *p2 =
|