From be49b5ec22ddd845d78eca7e7c2176c9d4c0aae3 Mon Sep 17 00:00:00 2001 From: Simo Sorce Date: Wed, 7 Jan 2009 09:30:00 -0500 Subject: Check size of incoming packets. This should fix a buffer overflow waiting to be exploited :/ --- server/nss/nsssrv.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) (limited to 'server/nss/nsssrv.c') diff --git a/server/nss/nsssrv.c b/server/nss/nsssrv.c index bd9202bdc..32ab43db1 100644 --- a/server/nss/nsssrv.c +++ b/server/nss/nsssrv.c @@ -112,7 +112,8 @@ static void client_recv(struct event_context *ev, struct cli_ctx *cctx) } if (!cctx->creq->in) { - ret = nss_packet_new(cctx->creq, 0, 0, &cctx->creq->in); + ret = nss_packet_new(cctx->creq, NSS_PACKET_MAX_RECV_SIZE, + 0, &cctx->creq->in); if (ret != EOK) { DEBUG(0, ("Failed to alloc request, aborting client!\n")); talloc_free(cctx); -- cgit