aboutsummaryrefslogtreecommitdiffstats
path: root/src/libstrongswan/asn1/asn1_parser.c
diff options
context:
space:
mode:
authorAndreas Steffen <andreas.steffen@strongswan.org>2009-06-19 14:44:11 +0200
committerAndreas Steffen <andreas.steffen@strongswan.org>2009-06-19 14:44:11 +0200
commit1e3bcfeb714d58f15e2779984462d59f062b6bb0 (patch)
tree8a8c76b0d27ebec5d400cc4bfba11e22fcf97585 /src/libstrongswan/asn1/asn1_parser.c
parentd7d349271697bddbf0566e674b10c30e30bf4c52 (diff)
downloadstrongswan-1e3bcfeb714d58f15e2779984462d59f062b6bb0.tar.bz2
strongswan-1e3bcfeb714d58f15e2779984462d59f062b6bb0.tar.xz
Fixed two DoS vulnerabilities in the ASN.1 parser, version bump to 4.2.16
Diffstat (limited to 'src/libstrongswan/asn1/asn1_parser.c')
-rw-r--r--src/libstrongswan/asn1/asn1_parser.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/src/libstrongswan/asn1/asn1_parser.c b/src/libstrongswan/asn1/asn1_parser.c
index 68c5e7307..a57f9adc6 100644
--- a/src/libstrongswan/asn1/asn1_parser.c
+++ b/src/libstrongswan/asn1/asn1_parser.c
@@ -160,7 +160,7 @@ static bool iterate(private_asn1_parser_t *this, int *objectID, chunk_t *object)
blob1->len = asn1_length(blob);
- if (blob1->len == ASN1_INVALID_LENGTH || blob->len < blob1->len)
+ if (blob1->len == ASN1_INVALID_LENGTH)
{
DBG1("L%d - %s: length of ASN.1 object invalid or too large",
level, obj.name);