Fix an input validation error that can result in an integer overflow
and privilege escalation.
Apply by doing:
cd /usr/src
patch -p0 < 006_sshpreauth.patch
cd usr.bin/ssh
make obj
make cleandir
make depend
make && make install
Index: auth2-chall.c
===================================================================
RCS file: /cvs/src/usr.bin/ssh/auth2-chall.c,v
retrieving revision 1.18
diff -u -r1.18 auth2-chall.c
--- usr.bin/ssh/auth2-chall.c 19 Jun 2002 00:27:55 -0000 1.18
+++ usr.bin/ssh/auth2-chall.c 26 Jun 2002 09:37:03 -0000
@@ -256,6 +256,8 @@
authctxt->postponed = 0; /* reset */
nresp = packet_get_int();
+ if (nresp > 100)
+ fatal("input_userauth_info_response: nresp too big %u", nresp);
if (nresp > 0) {
response = xmalloc(nresp * sizeof(char*));
for (i = 0; i < nresp; i++)