Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 5530] two potential buffer overflows

Date: Wed, 29 Dec 2010 12:09:47 -0800 (PST)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5530

Gerald Combs <gerald@xxxxxxxxxxxxx> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |gerald@xxxxxxxxxxxxx

--- Comment #3 from Gerald Combs <gerald@xxxxxxxxxxxxx> 2010-12-29 12:09:46 PST ---
Thanks! I checked in a modified fix for the MAC LTE dissector in r35292. 

It looks like the use of memcpy isn't needed in snmp_usm_password_to_key_sha1
(it's not used in snmp_usm_password_to_key_md5). I checked in a change in
r35298 which removes it entirely. I also added an engineId length check to the
SNMP preferences.

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.