From e46b508a36415b0fc76dbaaf6e65a5d9e425598f Mon Sep 17 00:00:00 2001 From: Ivan Nardi <12729895+IvanNardi@users.noreply.github.com> Date: Sat, 15 Jan 2022 20:53:36 +0100 Subject: Kerberos: fix use-of-uninitialized-value error (#1409) Detected by oss-fuzz: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=43677 --- src/lib/protocols/kerberos.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'src/lib/protocols/kerberos.c') diff --git a/src/lib/protocols/kerberos.c b/src/lib/protocols/kerberos.c index c89923fc6..98d919391 100644 --- a/src/lib/protocols/kerberos.c +++ b/src/lib/protocols/kerberos.c @@ -260,7 +260,7 @@ void ndpi_search_kerberos(struct ndpi_detection_module_struct *ndpi_struct, printf("[AS-REQ][s/dport: %u/%u][Kerberos Cname][len: %u][%s]\n", sport, dport, cname_len, cname_str); #endif - if(((strcmp(cname_str, "host") == 0) || (strcmp(cname_str, "ldap") == 0)) && (packet->payload[name_offset+1+cname_len] == 0x1b)) { + if(((strcmp(cname_str, "host") == 0) || (strcmp(cname_str, "ldap") == 0)) && (packet->payload[name_offset+1+cname_len] == 0x1b) && num_cname == 1) { name_offset += cname_len + 2; if (name_offset < packet->payload_packet_len) cname_len = packet->payload[name_offset]; -- cgit v1.2.3