Fix possible memory over-read in apps/s_client.c
authorRich Salz <rsalz@openssl.org>
Thu, 8 Jun 2017 13:26:20 +0000 (09:26 -0400)
committerRich Salz <rsalz@openssl.org>
Thu, 8 Jun 2017 13:26:20 +0000 (09:26 -0400)
a buffer returned from BIO_gets is not checked for it's length before
reading its contents.

Reviewed-by: Ben Kaduk <kaduk@mit.edu>
Reviewed-by: Andy Polyakov <appro@openssl.org>
Reviewed-by: Rich Salz <rsalz@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/3630)

apps/s_client.c

index 9ec7217376e157216399ed39ea2ab04254adef9e..84dad97a0436f26ef6b71400f949d8f70b7a4b03 100644 (file)
@@ -2172,6 +2172,15 @@ int s_client_main(int argc, char **argv)
              * HTTP/d.d ddd Reason text\r\n
              */
             mbuf_len = BIO_gets(fbio, mbuf, BUFSIZZ);
+            if (mbuf_len < (int)strlen("HTTP/1.0 200")) {
+                BIO_printf(bio_err,
+                           "%s: HTTP CONNECT failed, insufficient response "
+                           "from proxy (got %d octets)\n", prog, mbuf_len);
+                (void)BIO_flush(fbio);
+                BIO_pop(fbio);
+                BIO_free(fbio);
+                goto shut;
+            }
             if (mbuf[8] != ' ') {
                 BIO_printf(bio_err,
                            "%s: HTTP CONNECT failed, incorrect response "