commit | 75c1a6f97c9b25b71bcc95b158bc673f6db04400 | [log] [tgz] |
---|---|---|
author | Paul Bakker <p.j.bakker@polarssl.org> | Mon Aug 19 14:25:29 2013 +0200 |
committer | Paul Bakker <p.j.bakker@polarssl.org> | Mon Aug 19 14:25:29 2013 +0200 |
tree | b580458915ed4703764ba4c1f71962d6054a9b28 | |
parent | 694d3aeb47872d35e3e652bf6f39117a83f28246 [diff] |
Fixed potential heap buffer overflow on large hostname setting
diff --git a/library/ssl_tls.c b/library/ssl_tls.c index e2bc3da..9c1e53a 100644 --- a/library/ssl_tls.c +++ b/library/ssl_tls.c
@@ -3220,6 +3220,10 @@ return( POLARSSL_ERR_SSL_BAD_INPUT_DATA ); ssl->hostname_len = strlen( hostname ); + + if( ssl->hostname_len + 1 == 0 ) + return( POLARSSL_ERR_SSL_BAD_INPUT_DATA ); + ssl->hostname = (unsigned char *) polarssl_malloc( ssl->hostname_len + 1 ); if( ssl->hostname == NULL )