diff options
author | Guy Harris <guy@alum.mit.edu> | 2017-02-06 14:33:50 -0800 |
---|---|---|
committer | Denis Ovsienko <denis@ovsienko.info> | 2017-09-13 12:25:44 +0100 |
commit | c2ef693866beae071a24b45c49f9674af1df4028 (patch) | |
tree | fc8984c901380f06a0780b1d2922ca1c700e62e4 /print-telnet.c | |
parent | 50a44b6b8e4f7c127440dbd4239cf571945cc1e7 (diff) | |
download | tcpdump-c2ef693866beae071a24b45c49f9674af1df4028.tar.gz |
CVE-2017-12990/Fix printing of ISAKMPv1 Notification payload data.
The closest thing to a specification for the contents of the payload
data is draft-ietf-ipsec-notifymsg-04, and nothing in there says that it
is ever a complete ISAKMP message, so don't dissect types we don't have
specific code for as a complete ISAKMP message.
While we're at it, fix a comment, and clean up printing of V1 Nonce,
V2 Authentication payloads, and v2 Notice payloads.
This fixes an infinite loop discovered by Forcepoint's security
researchers Otto Airamo & Antti Levomäki.
Add a test using the capture file supplied by the reporter(s).
Diffstat (limited to 'print-telnet.c')
0 files changed, 0 insertions, 0 deletions