aboutsummaryrefslogtreecommitdiff
path: root/src/lib/protocols/openvpn.c
diff options
context:
space:
mode:
authorLuca Deri <deri@ntop.org>2020-05-15 21:10:37 +0200
committerLuca Deri <deri@ntop.org>2020-05-15 21:10:37 +0200
commit8e7b1ea7a136cc4e4aa9880072ec2d69900a825e (patch)
tree1c76ea062e8231fc5229f7b55d49f806b867bc95 /src/lib/protocols/openvpn.c
parente90c5c7c3223d033467aa359d8b1e264f961fde1 (diff)
Fix for potential heap-buffer-overflow in ndpi_search_openvpn
Diffstat (limited to 'src/lib/protocols/openvpn.c')
-rw-r--r--src/lib/protocols/openvpn.c51
1 files changed, 30 insertions, 21 deletions
diff --git a/src/lib/protocols/openvpn.c b/src/lib/protocols/openvpn.c
index 2753dd02e..f0e3428cf 100644
--- a/src/lib/protocols/openvpn.c
+++ b/src/lib/protocols/openvpn.c
@@ -72,11 +72,12 @@ void ndpi_search_openvpn(struct ndpi_detection_module_struct* ndpi_struct,
u_int8_t alen;
int8_t hmac_size;
int8_t failed = 0;
-
- if(packet->payload_packet_len >= 40) {
+ /* No u_ */int16_t ovpn_payload_len = packet->payload_packet_len;
+
+ if(ovpn_payload_len >= 40) {
// skip openvpn TCP transport packet size
if(packet->tcp != NULL)
- ovpn_payload += 2;
+ ovpn_payload += 2, ovpn_payload_len -= 2;;
opcode = ovpn_payload[0] & P_OPCODE_MASK;
@@ -85,16 +86,16 @@ void ndpi_search_openvpn(struct ndpi_detection_module_struct* ndpi_struct,
printf("[packet_id: %u][opcode: %u][Packet ID: %d][%u <-> %u][len: %u]\n",
flow->num_processed_pkts,
opcode, check_pkid_and_detect_hmac_size(ovpn_payload),
- htons(packet->udp->source), htons(packet->udp->dest), packet->payload_packet_len);
+ htons(packet->udp->source), htons(packet->udp->dest), ovpn_payload_len);
#endif
if(
(flow->num_processed_pkts == 1)
&& (
- ((packet->payload_packet_len == 112)
+ ((ovpn_payload_len == 112)
&& ((opcode == 168) || (opcode == 192))
)
- || ((packet->payload_packet_len == 80)
+ || ((ovpn_payload_len == 80)
&& ((opcode == 184) || (opcode == 88) || (opcode == 160) || (opcode == 168) || (opcode == 200)))
)) {
NDPI_LOG_INFO(ndpi_struct,"found openvpn\n");
@@ -119,22 +120,30 @@ void ndpi_search_openvpn(struct ndpi_detection_module_struct* ndpi_struct,
hmac_size = check_pkid_and_detect_hmac_size(ovpn_payload);
if(hmac_size > 0) {
- alen = ovpn_payload[P_PACKET_ID_ARRAY_LEN_OFFSET(hmac_size)];
+ u_int16_t offset = P_PACKET_ID_ARRAY_LEN_OFFSET(hmac_size);
+
+ alen = ovpn_payload[offset];
+
if (alen > 0) {
- session_remote = ovpn_payload + P_PACKET_ID_ARRAY_LEN_OFFSET(hmac_size) + 1 + alen * 4;
-
- if(memcmp(flow->ovpn_session_id, session_remote, 8) == 0) {
- NDPI_LOG_INFO(ndpi_struct,"found openvpn\n");
- ndpi_set_detected_protocol(ndpi_struct, flow, NDPI_PROTOCOL_OPENVPN, NDPI_PROTOCOL_UNKNOWN);
- return;
- } else {
- NDPI_LOG_DBG2(ndpi_struct,
- "key mismatch: %02x%02x%02x%02x%02x%02x%02x%02x\n",
- session_remote[0], session_remote[1], session_remote[2], session_remote[3],
- session_remote[4], session_remote[5], session_remote[6], session_remote[7]);
- failed = 1;
- }
- } else
+ offset += 1 + alen * 4;
+
+ if((offset+8) <= ovpn_payload_len) {
+ session_remote = &ovpn_payload[offset];
+
+ if(memcmp(flow->ovpn_session_id, session_remote, 8) == 0) {
+ NDPI_LOG_INFO(ndpi_struct,"found openvpn\n");
+ ndpi_set_detected_protocol(ndpi_struct, flow, NDPI_PROTOCOL_OPENVPN, NDPI_PROTOCOL_UNKNOWN);
+ return;
+ } else {
+ NDPI_LOG_DBG2(ndpi_struct,
+ "key mismatch: %02x%02x%02x%02x%02x%02x%02x%02x\n",
+ session_remote[0], session_remote[1], session_remote[2], session_remote[3],
+ session_remote[4], session_remote[5], session_remote[6], session_remote[7]);
+ failed = 1;
+ }
+ } else
+ failed = 1;
+ } else
failed = 1;
} else
failed = 1;