]> The Tcpdump Group git mirrors - tcpdump/commit
CVE-2017-13013/ARP: Fix printing of ARP protocol addresses.
authorGuy Harris <[email protected]>
Thu, 16 Mar 2017 17:54:31 +0000 (10:54 -0700)
committerDenis Ovsienko <[email protected]>
Wed, 13 Sep 2017 11:25:44 +0000 (12:25 +0100)
commit13ab8d18617d616c7d343530f8a842e7143fb5cc
tree0c19ee2e2a0ea8372b0b14e6cef3a507248ec72c
parent8509ef02eceb2bbb479cea10fe4a7ec6395f1a8b
CVE-2017-13013/ARP: Fix printing of ARP protocol addresses.

If the protocol type isn't ETHERTYPE_IP or ETHERTYPE_TRAIL, or if the
protocol address length isn't 4, don't print the address as an IPv4 address.

This fixes a buffer over-read discovered by Bhargava Shastry,
SecT/TU Berlin.

Add a test using the capture file supplied by the reporter(s), modified
so the capture file won't be rejected as an invalid capture.

Update another test file's tcpdump output to reflect this change.
print-arp.c
tests/TESTLIST
tests/arp-oobr.out
tests/getname_2_read4_asan.out [new file with mode: 0644]
tests/getname_2_read4_asan.pcap [new file with mode: 0644]