All of lore.kernel.org
 help / color / mirror / Atom feed
* [Qemu-devel] possible denial of service via VNC
@ 2014-06-29 12:16 Peter Lieven
  2014-06-29 17:12 ` Anthony Liguori
  2014-06-30  7:33 ` Gerd Hoffmann
  0 siblings, 2 replies; 6+ messages in thread
From: Peter Lieven @ 2014-06-29 12:16 UTC (permalink / raw)
  To: Gerd Hoffmann, qemu-devel

Hi,

while debugging a VNC issue I found this:

    case VNC_MSG_CLIENT_CUT_TEXT:
        if (len == 1)
            return 8;

        if (len == 8) {
            uint32_t dlen = read_u32(data, 4);
            if (dlen > 0)
                return 8 + dlen;
        }

        client_cut_text(vs, read_u32(data, 4), data + 8);
        break;

in protocol_client_msg().

Is this really a good idea? This allows for letting the vs->input buffer to grow
up to 2^32 + 8 byte which will possibly result in an out of memory condition.

Peter

^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2014-06-30  7:52 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2014-06-29 12:16 [Qemu-devel] possible denial of service via VNC Peter Lieven
2014-06-29 17:12 ` Anthony Liguori
2014-06-30  7:33 ` Gerd Hoffmann
2014-06-30  7:45   ` Peter Lieven
2014-06-30  7:46     ` Gerd Hoffmann
2014-06-30  7:51       ` Peter Lieven

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.