1
0
mirror of https://github.com/moparisthebest/curl synced 2024-12-22 08:08:50 -05:00

ftp: reject illegal IP/port in PASV 227 response

... by using range checks. Among other things, this avoids an undefined
behavior for a left shift that could happen on negative or very large
values.

Closes #1997

Detected by OSS-fuzz: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=3694
This commit is contained in:
Daniel Stenberg 2017-10-19 14:41:14 +02:00
parent 8351ab4510
commit 769647e714
No known key found for this signature in database
GPG Key ID: 5CC908FDB71E12C2
2 changed files with 7 additions and 10 deletions

View File

@ -1874,8 +1874,8 @@ static CURLcode ftp_state_pasv_resp(struct connectdata *conn,
else if((ftpc->count1 == 1) && else if((ftpc->count1 == 1) &&
(ftpcode == 227)) { (ftpcode == 227)) {
/* positive PASV response */ /* positive PASV response */
int ip[4]; unsigned int ip[4];
int port[2]; unsigned int port[2];
/* /*
* Scan for a sequence of six comma-separated numbers and use them as * Scan for a sequence of six comma-separated numbers and use them as
@ -1887,14 +1887,15 @@ static CURLcode ftp_state_pasv_resp(struct connectdata *conn,
* "227 Entering passive mode. 127,0,0,1,4,51" * "227 Entering passive mode. 127,0,0,1,4,51"
*/ */
while(*str) { while(*str) {
if(6 == sscanf(str, "%d,%d,%d,%d,%d,%d", if(6 == sscanf(str, "%u,%u,%u,%u,%u,%u",
&ip[0], &ip[1], &ip[2], &ip[3], &ip[0], &ip[1], &ip[2], &ip[3],
&port[0], &port[1])) &port[0], &port[1]))
break; break;
str++; str++;
} }
if(!*str) { if(!*str || (ip[0] > 255) || (ip[1] > 255) || (ip[2] > 255) ||
(ip[3] > 255) || (port[0] > 255) || (port[1] > 255) ) {
failf(data, "Couldn't interpret the 227-response"); failf(data, "Couldn't interpret the 227-response");
return CURLE_FTP_WEIRD_227_FORMAT; return CURLE_FTP_WEIRD_227_FORMAT;
} }

View File

@ -30,13 +30,9 @@ ftp://%HOSTIP:%FTPPORT/237 --disable-epsv
# certain hosts with buggy resolver code, the resulting address (192.0.2.127) # certain hosts with buggy resolver code, the resulting address (192.0.2.127)
# is from an address block that is guaranteed never to be assigned (RFC3330). # is from an address block that is guaranteed never to be assigned (RFC3330).
<verify> <verify>
# curl: (15) Can't resolve new host 1216.256.2.127:32639 # 14 = CURLE_FTP_WEIRD_227_FORMAT
# 15 => CURLE_FTP_CANT_GET_HOST
# some systems just don't fail on the illegal host name/address but instead
# moves on and attempt to connect to... yes, to what?
# 7= CURLE_COULDNT_CONNECT
<errorcode> <errorcode>
15, 7 14
</errorcode> </errorcode>
<protocol> <protocol>
USER anonymous USER anonymous