]> asedeno.scripts.mit.edu Git - PuTTY.git/commit
Tighten up bounds-checking of agent responses.
authorSimon Tatham <anakin@pobox.com>
Tue, 14 Feb 2017 21:52:28 +0000 (21:52 +0000)
committerSimon Tatham <anakin@pobox.com>
Tue, 14 Feb 2017 23:25:26 +0000 (23:25 +0000)
commita146ab2e7aa984f8f5d7ec97e14bbf7ebeb30823
treea8f9a4747f42b0f5c9b0d68d60f8c59b1287a81b
parent50965a6411b8da9301501e91262bfe6cf8c808ae
Tighten up bounds-checking of agent responses.

I think an agent sending a string length exceeding the buffer bounds
by less than 4 could have made PuTTY read beyond its own buffer end.
Not that I really think a hostile SSH agent is likely to be attacking
PuTTY, but it's as well to fix these things anyway!
ssh.c