Fix possible buffer overflow when dealing with auth challenge/response
This commit is contained in:
parent
3015533293
commit
60be20cf32
1 changed files with 6 additions and 2 deletions
4
l2tpns.c
4
l2tpns.c
|
|
@ -5074,8 +5074,12 @@ void processudp(uint8_t *buf, int len, struct sockaddr_in *addr, uint16_t indexu
|
|||
LOG(3, s, t, "Reusing LCP negotiation\n");
|
||||
// Start with proxy auth id to avoid client caching challenge responses
|
||||
sess_local[s].auth_id = authid;
|
||||
if (authchalln <= 16) {
|
||||
memcpy(sess_local[s].auth_chall, authchall, authchalln);
|
||||
}
|
||||
if (authrespn <= 64) {
|
||||
memcpy(sess_local[s].auth_resp, authresp, authrespn);
|
||||
}
|
||||
if (atype != 0) {
|
||||
sess_local[s].auth_type = atype;
|
||||
}
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue