URL: https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=f2c0a286479b208b2c4f68afc218dacfc4ac709e
Submitter: Michael Mann (mmann78@xxxxxxxxxxxx)
Changed: branch: master-1.12
Repository: wireshark
Commits:
f2c0a28 by Michael Mann (mmann78@xxxxxxxxxxxx):
Make sure EAPOL body is big enough for a EAPOL_RSN_KEY.
A pointer to a EAPOL_RSN_KEY is set on the packet presuming the
whole EAPOL_RSN_KEY is there. That's not always the case for
fuzzed/malicious captures.
Bug: 11585
Change-Id: Ib94b8aceef444c7820e43b969596efdb8dbecccd
Reviewed-on: https://code.wireshark.org/review/15540
Reviewed-by: Michael Mann <mmann78@xxxxxxxxxxxx>
Petri-Dish: Michael Mann <mmann78@xxxxxxxxxxxx>
Tested-by: Petri Dish Buildbot <buildbot-no-reply@xxxxxxxxxxxxx>
Reviewed-by: Anders Broman <a.broman58@xxxxxxxxx>
(cherry picked from commit 9b0b20b8d5f8c9f7839d58ff6c5900f7e19283b4)
Reviewed-on: https://code.wireshark.org/review/15544
Actions performed:
from 37c02f3 [Automatic update for 2016-05-22]
adds f2c0a28 Make sure EAPOL body is big enough for a EAPOL_RSN_KEY.
Summary of changes:
epan/crypt/airpdcap.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)