[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-dev] DNS/DNSSEC resolving in Tor (PoC implementation)
On 01/30/2012 10:45 AM, Roger Dingledine wrote:
> On Thu, Jan 26, 2012 at 10:42:53PM +0100, Ondrej Mikle wrote:
>> Also, this seems to be a bug in
>> relay.c:connection_edge_process_relay_cell_not_open(), the
>> RELAY_COMMAND_RESOLVED case:
>>
>> answer_len = cell->payload[RELAY_HEADER_SIZE+1];
>> if (rh->length < 2 || answer_len+2>rh->length) {...}
>>
>> Payload is accessed before checking bounds.
>
> cell->payload is a fixed-size array. It's going to be there no matter
> what values are in it.
>
> Unless I'm misunderstanding you?
You're right. For some reason I thought it was malloc-ed buffer, but it's not.
Ondrej
_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev