aboutsummaryrefslogtreecommitdiff
path: root/src/lib/protocols
Commit message (Collapse)AuthorAge
* Added detection of self-signed TLS certificatesLuca Deri2020-05-10
|
* Added the ability to detect when a known protocol is using a non-standard portLuca Deri2020-05-10
| | | | Added check to spot executables exchanged via HTTP
* Added TLS issuerDN and subjectDNLuca Deri2020-05-07
|
* Reworked TLS dissector with a certificate RDN sequence readerLuca Deri2020-05-07
|
* Added support for Telegram v6Luca Deri2020-05-06
|
* False positive fixesLuca Deri2020-05-06
|
* Removed now obsolete MSN protocolLuca Deri2020-05-03
| | | | Added nats.io protocol dissector
* SSH boundary check reworkLuca Deri2020-04-30
|
* Minor cleanupLuca Deri2020-04-30
|
* Better fix for integer overflow in SSHPhilippe Antoine2020-04-30
| | | | Credits to GHSL
* :bulb: implement websocket protocol dissectorLeonn Paiva2020-04-26
|
* Warning fixLuca Deri2020-04-22
|
* Fix some compilation warningsNardi Ivan2020-04-20
|
* CiscoVPN dissection improvementsLuca Deri2020-04-17
|
* Fixed invalid checkLuca Deri2020-04-15
|
* Adds netbios bound checkPhilippe Antoine2020-04-15
|
* TLS initializes version_strPhilippe Antoine2020-04-15
|
* Adds bound check for IRCPhilippe Antoine2020-04-15
|
* Fix integer overflow in quicPhilippe Antoine2020-04-15
|
* Adds bound check in TLSPhilippe Antoine2020-04-15
|
* Fixes OOB reads in postgresPhilippe Antoine2020-04-15
| | | | Reported by GHSL
* Merge pull request #869 from disconnect3d/patch-2Luca Deri2020-04-15
|\ | | | | Fix incorrect "<iq from=\"' parsing
| * Fix incorrect "<iq from=\"' parsingDisconnect3d2020-04-13
| | | | | | This PR fixes a wrong size arg passed to memcmp when checking for "<iq from=\"" and "<iq from \'" strings.
* | Merge pull request #868 from disconnect3d/patch-1Luca Deri2020-04-15
|\ \ | | | | | | Fix off by one when checking for "GET / HTTP" string
| * | Fix off by one when checking for "GET / HTTP" stringDisconnect3d2020-04-13
| |/
* | Fix some debug messagesNardi Ivan2020-04-08
| |
* | kerberos: fix heap-overflow errorNardi Ivan2020-04-08
| |
* | s7comm: fix heap-overflow errorNardi Ivan2020-04-08
|/
* ssh: fixing unsigned overflow leading to heap overflowPhilippe Antoine2020-04-02
| | | | cf GHSL-2020-051
* ssh: adds systematic bounds checks in concat_hash_stringPhilippe Antoine2020-04-02
| | | | cf GHSL-2020-052
* openvpn: fix heap-overflow errorNardi Ivan2020-03-27
|
* telnet: fix another heap-overflow errorNardi Ivan2020-03-27
|
* telnet: fix heap-overflow errorNardi Ivan2020-03-27
| | | | | There is some boilerplate since I removed an if branch and I had to reindent the code
* kerberos: fix use-after-free errorNardi Ivan2020-03-27
| | | | | After leaving kerberos code, the original packet may be processed from other dissector (i.e. TLS)
* tls: fix heap-overflow errorNardi Ivan2020-03-27
|
* ssh: fix heap-overflow errorNardi Ivan2020-03-27
|
* quic: fix heap-overflow errorNardi Ivan2020-03-27
|
* h323: fix heap-overflow errorNardi Ivan2020-03-27
|
* soulseek: fix heap-overflow errorNardi Ivan2020-03-27
|
* ciscovpn: fix heap-overflow errorNardi Ivan2020-03-27
|
* Update s7comm.chavup2020-03-27
|
* Update s7comm.chavup2020-03-27
|
* Update s7comm.chavup2020-03-27
|
* Update s7comm.chavup2020-03-27
|
* Update s7comm.chavup2020-03-26
|
* Add files via uploadhavup2020-03-25
|
* Fixed invalid allocationLuca Deri2020-03-24
|
* tls_supported_versions only if version_str is initializedPhilippe Antoine2020-03-19
| | | | With version_len == (extension_len-1)
* Fix use of uninitialized value in TLSPhilippe Antoine2020-03-19
|
* Adds different checks against overflowsPhilippe Antoine2020-03-19
|