diff options
author | Darren Salt <linux@youmustbejoking.demon.co.uk> | 2008-01-23 19:40:16 +0000 |
---|---|---|
committer | Darren Salt <linux@youmustbejoking.demon.co.uk> | 2008-01-23 19:40:16 +0000 |
commit | 3a3fa364d3380c95f453f8f225a601279d8ed056 (patch) | |
tree | 79863a78d767f2b0c7ccc6953a9d06dd02a897a0 /src | |
parent | 3f51525e97a2787611a2cbf91dd609c7f2ddb2fb (diff) | |
download | xine-lib-3a3fa364d3380c95f453f8f225a601279d8ed056.tar.gz xine-lib-3a3fa364d3380c95f453f8f225a601279d8ed056.tar.bz2 |
Sanity-check ASF header sizes.
This fixes a crash in the ASF demuxer, caused by the example exploit file given
for CVE-2006-1664.
Diffstat (limited to 'src')
-rw-r--r-- | src/demuxers/demux_asf.c | 17 |
1 files changed, 16 insertions, 1 deletions
diff --git a/src/demuxers/demux_asf.c b/src/demuxers/demux_asf.c index c4a154f99..4eb9398be 100644 --- a/src/demuxers/demux_asf.c +++ b/src/demuxers/demux_asf.c @@ -379,10 +379,21 @@ static int asf_read_header (demux_asf_t *this) { char *asf_header_buffer = NULL; asf_header_len = get_le64(this); - asf_header_buffer = alloca(asf_header_len); + if (asf_header_len > 4 * 1024 * 1024) + { + xprintf(this->stream->xine, XINE_VERBOSITY_DEBUG, + "demux_asf: asf_read_header: overly-large header? (%"PRIu64" bytes)\n", + asf_header_len); + return 0; + } + + asf_header_buffer = malloc (asf_header_len); if (this->input->read (this->input, asf_header_buffer, asf_header_len) != asf_header_len) + { + free (asf_header_buffer); return 0; + } /* delete previous header */ if (this->asf_header) { @@ -395,7 +406,11 @@ static int asf_read_header (demux_asf_t *this) { */ this->asf_header = asf_header_new(asf_header_buffer, asf_header_len); if (!this->asf_header) + { + free (asf_header_buffer); return 0; + } + free (asf_header_buffer); lprintf("asf header parsing ok\n"); |