@@ -10999,7 +10999,9 @@ static int mg_tls_server_recv_hello(struct mg_connection *c) {
10999
10999
mg_error(c, "not a client hello packet");
11000
11000
return -1;
11001
11001
}
11002
+ if (rio->len < 50) goto fail;
11002
11003
msgsz = MG_LOAD_BE16(rio->buf + 3);
11004
+ if (((uint32_t) msgsz + 4) > rio->len) goto fail;
11003
11005
mg_sha256_update(&tls->sha256, rio->buf + 5, msgsz);
11004
11006
// store client random
11005
11007
memmove(tls->random, rio->buf + 11, sizeof(tls->random));
@@ -11011,10 +11013,11 @@ static int mg_tls_server_recv_hello(struct mg_connection *c) {
11011
11013
MG_INFO(("bad session id len"));
11012
11014
}
11013
11015
cipher_suites_len = MG_LOAD_BE16(rio->buf + 44 + session_id_len);
11014
- if (cipher_suites_len > (rio->len - 46 - session_id_len)) goto fail;
11016
+ if (((uint32_t) cipher_suites_len + 46 + session_id_len) > rio->len)
11017
+ goto fail;
11015
11018
ext_len = MG_LOAD_BE16(rio->buf + 48 + session_id_len + cipher_suites_len);
11016
11019
ext = rio->buf + 50 + session_id_len + cipher_suites_len;
11017
- if (ext_len > (rio->len - 50 - session_id_len - cipher_suites_len )) goto fail;
11020
+ if (((unsigned char *) ext + ext_len) > (rio->buf + rio->len )) goto fail;
11018
11021
for (j = 0; j < ext_len;) {
11019
11022
uint16_t k;
11020
11023
uint16_t key_exchange_len;
@@ -11026,12 +11029,12 @@ static int mg_tls_server_recv_hello(struct mg_connection *c) {
11026
11029
}
11027
11030
key_exchange_len = MG_LOAD_BE16(ext + j + 4);
11028
11031
key_exchange = ext + j + 6;
11029
- if (key_exchange_len >
11030
- rio->len - (uint16_t) (( size_t) key_exchange - (size_t) rio->buf))
11032
+ if (((size_t) key_exchange_len +
11033
+ (( size_t) key_exchange - (size_t) rio->buf)) > rio->len )
11031
11034
goto fail;
11032
11035
for (k = 0; k < key_exchange_len;) {
11033
11036
uint16_t m = MG_LOAD_BE16(key_exchange + k + 2);
11034
- if (m > (key_exchange_len - k - 4)) goto fail;
11037
+ if (((uint32_t) m + k + 4) > key_exchange_len ) goto fail;
11035
11038
if (m == 32 && key_exchange[k] == 0x00 && key_exchange[k + 1] == 0x1d) {
11036
11039
memmove(tls->x25519_cli, key_exchange + k + 4, m);
11037
11040
mg_tls_drop_record(c);
0 commit comments