Skip to content
This repository has been archived by the owner on Sep 1, 2022. It is now read-only.

Buffer overflow with RSA 4096 in streaming when signature included #767

Closed
majestrate opened this issue Dec 6, 2017 · 3 comments · Fixed by #769
Closed

Buffer overflow with RSA 4096 in streaming when signature included #767

majestrate opened this issue Dec 6, 2017 · 3 comments · Fixed by #769

Comments

@majestrate
Copy link
Contributor


By submitting this issue, I confirm the following:

  • I have read and understood the contributor guide in kovri-docs.
  • I have checked that the issue I am reporting can be replicated or that the feature I am suggesting is not present.
  • I have checked opened or recently closed pull requests for existing solutions/implementations to my issue/suggestion.

https://github.com/monero-project/kovri/blob/master/src/client/api/streaming.cc#L271-L273 vs 512 bytes signature

fixed in i2pd 2.17.0

@anonimal
Copy link
Collaborator

anonimal commented Dec 8, 2017

Thank you for the report, @majestrate.

As noted, the issue resides with i2pd code that has yet to be reviewed for QA and subsequently rewritten; similar to this report and as noted in #511, #366, #643, and others. Note: the same applies to all datagram/streaming code.

Ironically, the currently open #755 (with my patches noted in the comments but not yet PR'd) would've resolved this issue at the signature level but a trivial patch should be applied in the meantime.

anonimal added a commit to anonimal/kovri that referenced this issue Dec 8, 2017
anonimal added a commit to anonimal/kovri that referenced this issue Dec 8, 2017
@majestrate
Copy link
Contributor Author

CVE 2017-17066 was also fixed in 2.17.0

@anonimal
Copy link
Collaborator

anonimal commented Dec 8, 2017

Yes, as noted in the report and #759, we've already resolved that. Thanks again.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants