|
|
a66391 |
From 040c492b4beb0efcd34b8420f682187441767055 Mon Sep 17 00:00:00 2001
|
|
|
a66391 |
From: Mark Reynolds <mreynolds@redhat.com>
|
|
|
a66391 |
Date: Tue, 16 Jan 2018 09:46:49 -0500
|
|
|
a66391 |
Subject: [PATCH] CVE-2017-15134 389-ds-base: Remote DoS via search filters in
|
|
|
a66391 |
slapi_filter_sprintf
|
|
|
a66391 |
|
|
|
a66391 |
Description: Improper handling of a search filter in slapi_filter_sprintf
|
|
|
a66391 |
in slapd/util.c can lead to remote server crash and denial
|
|
|
a66391 |
of service.
|
|
|
a66391 |
|
|
|
a66391 |
https://bugzilla.redhat.com/show_bug.cgi?id=1529117
|
|
|
a66391 |
---
|
|
|
a66391 |
ldap/servers/slapd/util.c | 36 +++++++++++++++++++++++++++++++-----
|
|
|
a66391 |
1 file changed, 31 insertions(+), 5 deletions(-)
|
|
|
a66391 |
|
|
|
a66391 |
diff --git a/ldap/servers/slapd/util.c b/ldap/servers/slapd/util.c
|
|
|
a66391 |
index 4ff6d4141..ffeeff6f3 100644
|
|
|
a66391 |
--- a/ldap/servers/slapd/util.c
|
|
|
a66391 |
+++ b/ldap/servers/slapd/util.c
|
|
|
a66391 |
@@ -224,9 +224,10 @@ escape_string_for_filename(const char *str, char buf[BUFSIZ])
|
|
|
a66391 |
|
|
|
a66391 |
struct filter_ctx {
|
|
|
a66391 |
char *buf;
|
|
|
a66391 |
- char attr[ATTRSIZE];
|
|
|
a66391 |
+ char *attr;
|
|
|
a66391 |
int attr_position;
|
|
|
a66391 |
int attr_found;
|
|
|
a66391 |
+ size_t attr_size;
|
|
|
a66391 |
int buf_size;
|
|
|
a66391 |
int buf_len;
|
|
|
a66391 |
int next_arg_needs_esc_norm;
|
|
|
a66391 |
@@ -265,7 +266,7 @@ filter_stuff_func(void *arg, const char *val, PRUint32 slen)
|
|
|
a66391 |
* Start collecting the attribute name so we can use the correct
|
|
|
a66391 |
* syntax normalization func.
|
|
|
a66391 |
*/
|
|
|
a66391 |
- if(ctx->attr_found == 0 && ctx->attr_position < (ATTRSIZE - 1)){
|
|
|
a66391 |
+ if(ctx->attr_found == 0 && ctx->attr_position < (ctx->attr_size - 1)) {
|
|
|
a66391 |
if(ctx->attr[0] == '\0'){
|
|
|
a66391 |
if(strstr(val,"=")){
|
|
|
a66391 |
/* we have an attr we need to record */
|
|
|
a66391 |
@@ -279,6 +280,14 @@ filter_stuff_func(void *arg, const char *val, PRUint32 slen)
|
|
|
a66391 |
* attr with val. The next pass should be '=', otherwise we will
|
|
|
a66391 |
* reset it.
|
|
|
a66391 |
*/
|
|
|
a66391 |
+ if (slen > ctx->attr_size) {
|
|
|
a66391 |
+ if (ctx->attr_size == ATTRSIZE) {
|
|
|
a66391 |
+ ctx->attr = slapi_ch_calloc(sizeof(char), slen+1);
|
|
|
a66391 |
+ } else {
|
|
|
a66391 |
+ ctx->attr = slapi_ch_realloc(ctx->attr, sizeof(char) * (slen+1));
|
|
|
a66391 |
+ }
|
|
|
a66391 |
+ ctx->attr_size = slen+1;
|
|
|
a66391 |
+ }
|
|
|
a66391 |
memcpy(ctx->attr, val, slen);
|
|
|
a66391 |
ctx->attr_position = slen;
|
|
|
a66391 |
}
|
|
|
a66391 |
@@ -288,9 +297,20 @@ filter_stuff_func(void *arg, const char *val, PRUint32 slen)
|
|
|
a66391 |
} else {
|
|
|
a66391 |
if(special_attr_char(val[0])){
|
|
|
a66391 |
/* this is not an attribute, we should not be collecting this, reset everything */
|
|
|
a66391 |
- memset(ctx->attr, '\0', ATTRSIZE);
|
|
|
a66391 |
+ memset(ctx->attr, '\0', ctx->attr_size);
|
|
|
a66391 |
ctx->attr_position = 0;
|
|
|
a66391 |
} else {
|
|
|
a66391 |
+ /* we can be adding char by char and overrun allocated size */
|
|
|
a66391 |
+ if (ctx->attr_position >= ctx->attr_size) {
|
|
|
a66391 |
+ if (ctx->attr_size == ATTRSIZE) {
|
|
|
a66391 |
+ char *ctxattr = slapi_ch_calloc(sizeof(char), ctx->attr_size + ATTRSIZE);
|
|
|
a66391 |
+ memcpy(ctxattr, ctx->attr, ctx->attr_size);
|
|
|
a66391 |
+ ctx->attr = ctxattr;
|
|
|
a66391 |
+ } else {
|
|
|
a66391 |
+ ctx->attr = slapi_ch_realloc(ctx->attr, sizeof(char) * (ctx->attr_size + ATTRSIZE));
|
|
|
a66391 |
+ }
|
|
|
a66391 |
+ ctx->attr_size = ctx->attr_size + ATTRSIZE;
|
|
|
a66391 |
+ }
|
|
|
a66391 |
memcpy(ctx->attr + ctx->attr_position, val, 1);
|
|
|
a66391 |
ctx->attr_position++;
|
|
|
a66391 |
}
|
|
|
a66391 |
@@ -363,7 +383,7 @@ filter_stuff_func(void *arg, const char *val, PRUint32 slen)
|
|
|
a66391 |
ctx->next_arg_needs_esc_norm = 0;
|
|
|
a66391 |
ctx->attr_found = 0;
|
|
|
a66391 |
ctx->attr_position = 0;
|
|
|
a66391 |
- memset(ctx->attr, '\0', ATTRSIZE);
|
|
|
a66391 |
+ memset(ctx->attr, '\0', ctx->attr_size);
|
|
|
a66391 |
slapi_ch_free_string(&buf;;
|
|
|
a66391 |
|
|
|
a66391 |
return filter_len;
|
|
|
a66391 |
@@ -402,13 +422,15 @@ slapi_filter_sprintf(const char *fmt, ...)
|
|
|
a66391 |
{
|
|
|
a66391 |
struct filter_ctx ctx = {0};
|
|
|
a66391 |
va_list args;
|
|
|
a66391 |
+ char attr_static[ATTRSIZE] = {0};
|
|
|
a66391 |
char *buf;
|
|
|
a66391 |
int rc;
|
|
|
a66391 |
|
|
|
a66391 |
buf = slapi_ch_calloc(sizeof(char), FILTER_BUF + 1);
|
|
|
a66391 |
ctx.buf = buf;
|
|
|
a66391 |
- memset(ctx.attr,'\0', ATTRSIZE);
|
|
|
a66391 |
ctx.attr_position = 0;
|
|
|
a66391 |
+ ctx.attr = attr_static;
|
|
|
a66391 |
+ ctx.attr_size = ATTRSIZE;
|
|
|
a66391 |
ctx.attr_found = 0;
|
|
|
a66391 |
ctx.buf_len = FILTER_BUF;
|
|
|
a66391 |
ctx.buf_size = 0;
|
|
|
a66391 |
@@ -424,6 +446,10 @@ slapi_filter_sprintf(const char *fmt, ...)
|
|
|
a66391 |
}
|
|
|
a66391 |
va_end(args);
|
|
|
a66391 |
|
|
|
a66391 |
+ if (ctx.attr_size > ATTRSIZE) {
|
|
|
a66391 |
+ slapi_ch_free_string(&ctx.attr);
|
|
|
a66391 |
+ }
|
|
|
a66391 |
+
|
|
|
a66391 |
return ctx.buf;
|
|
|
a66391 |
}
|
|
|
a66391 |
|
|
|
a66391 |
--
|
|
|
a66391 |
2.13.6
|
|
|
a66391 |
|