Browse Source

nfqws: safety check

pull/1334/head
bol-van 4 months ago
parent
commit
d04419a60c
  1. 4
      nfq/desync.c

4
nfq/desync.c

@ -657,7 +657,9 @@ static bool runtime_tls_mod(int fake_n,const struct fake_tls_mod_cache *modcache
} }
if (tls_mod->mod & FAKE_TLS_MOD_DUP_SID) if (tls_mod->mod & FAKE_TLS_MOD_DUP_SID)
{ {
if (fake_data[43]!=payload[43]) if (payload_len<44)
DLOG("fake[%d] cannot apply dupsid tls mod. data payload is too short.\n",fake_n);
else if (fake_data[43]!=payload[43])
DLOG("fake[%d] cannot apply dupsid tls mod. fake and orig session id length mismatch.\n",fake_n); DLOG("fake[%d] cannot apply dupsid tls mod. fake and orig session id length mismatch.\n",fake_n);
else if (payload_len<(44+payload[43])) else if (payload_len<(44+payload[43]))
DLOG("fake[%d] cannot apply dupsid tls mod. data payload is not valid.\n",fake_n); DLOG("fake[%d] cannot apply dupsid tls mod. data payload is not valid.\n",fake_n);

Loading…
Cancel
Save