Go to:
Gentoo Home
Documentation
Forums
Lists
Bugs
Planet
Store
Wiki
Get Gentoo!
Gentoo's Bugzilla – Attachment 10800 Details for
Bug 19379
Snort Security Vulnerability - Remotely exploitable buffer overflow in 1.8.x, 1.9.x, and 2.0 < RC1
Home
|
New
–
[Ex]
|
Browse
|
Search
|
Privacy Policy
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
Alpha patch for 2.0.0
snort-2.0.0-alpha.patch (text/plain), 3.14 KB, created by
Bug Hunter
on 2003-04-17 18:09:31 UTC
(
hide
)
Description:
Alpha patch for 2.0.0
Filename:
MIME Type:
Creator:
Bug Hunter
Created:
2003-04-17 18:09:31 UTC
Size:
3.14 KB
patch
obsolete
>diff -ur --minimal snort-2.0.0.orig/src/preprocessors/spp_http_decode.c snort-2.0.0/src/preprocessors/spp_http_decode.c >--- snort-2.0.0.orig/src/preprocessors/spp_http_decode.c 2003-04-03 16:10:53.000000000 -0500 >+++ snort-2.0.0/src/preprocessors/spp_http_decode.c 2003-04-17 16:55:19.000000000 -0400 >@@ -482,11 +482,11 @@ > psize = (u_int16_t) (p->dsize); > > /* first skip past the HTTP method */ >- while(index < end && !lookup_whitespace[(u_int) (*index)]) >+ while(index < end && !lookup_whitespace[(u_char) (*index)]) > index++; > > /* skip over whitespace seperator */ >- while(index < end && lookup_whitespace[(u_int) (*index)]) >+ while(index < end && lookup_whitespace[(u_char) (*index)]) > index++; > > /* evilness check */ >@@ -543,7 +543,7 @@ > * Would be included if we could munge packets in place but we need the > * original packet data to stay around > * >- * do { if(*index == '%' || lookup_whitespace[(u_int)(*index)]) break; >+ * do { if(*index == '%' || lookup_whitespace[(u_char)(*index)]) break; > * if(*index == '?' && end_on_url_param) break; if(*index == '\\' && > * iis_flip_slash) (*index) = '/'; } while(index++ < end); > * >@@ -578,14 +578,14 @@ > */ > > junk = 0; >- hex1 = lookup_hexvalue[(u_int) (*(index + 2))]; >- hex2 = lookup_hexvalue[(u_int) (*(index + 3))]; >+ hex1 = lookup_hexvalue[(u_char) (*(index + 2))]; >+ hex2 = lookup_hexvalue[(u_char) (*(index + 3))]; > if(hex1 != -1 && hex2 != -1) > { > junk = ((hex1 & 0x0f) << 12) + ((hex2 & 0x0f) << 8); > >- hex1 = lookup_hexvalue[(u_int) (*(index + 4))]; >- hex2 = lookup_hexvalue[(u_int) (*(index + 5))]; >+ hex1 = lookup_hexvalue[(u_char) (*(index + 4))]; >+ hex2 = lookup_hexvalue[(u_char) (*(index + 5))]; > if(hex1 != -1 && hex2 != -1) > { > junk += (((hex1 & 0x0f) << 4) + (hex2 & 0x0f)); >@@ -639,8 +639,8 @@ > > if((index + 2) < end) > { >- hex1 = lookup_hexvalue[(u_int) (*(index + 1))]; >- hex2 = lookup_hexvalue[(u_int) (*(index + 2))]; >+ hex1 = lookup_hexvalue[(u_char) (*(index + 1))]; >+ hex2 = lookup_hexvalue[(u_char) (*(index + 2))]; > } > else > { >@@ -694,7 +694,7 @@ > continue; > } > } >- else if(lookup_whitespace[(u_int) (*index)]) >+ else if(lookup_whitespace[(u_char) (*index)]) > { > /* we've reached the delimiting whitespace */ > /* UriBufs[0].http_version = (u_int8_t *) index; */ >@@ -712,7 +712,7 @@ > *cur = *index; > while(index < end && ((cur - (char *) UriBufs[0].uri) < URI_LENGTH)) > { >- if(lookup_whitespace[(u_int) (*index)]) >+ if(lookup_whitespace[(u_char) (*index)]) > { > /* > * we've reached the >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 19379
:
10799
| 10800