fix bug which allowed for unencrypted sessions - markus@

This commit is contained in:
dugsong 1999-12-14 01:35:04 +00:00
parent 78edeef281
commit a94b6ef6a9
2 changed files with 17 additions and 2 deletions

View File

@ -0,0 +1,14 @@
--- sshd.c.orig Mon Dec 13 20:27:21 1999
+++ sshd.c Mon Dec 13 20:28:45 1999
@@ -1496,8 +1496,10 @@
/* Read clients reply (cipher type and session key). */
packet_read_expect(SSH_CMSG_SESSION_KEY);
- /* Get cipher type. */
+ /* Get cipher type and check whether we accept this. */
cipher_type = packet_get_char();
+ if (!(cipher_mask() & (1 << cipher_type)))
+ packet_disconnect("Warning: client selects unsupported cipher.");
/* Get check bytes from the packet. These must match those we sent earlier
with the public key packet. */

View File

@ -1,5 +1,6 @@
ssh-1.2.27: patch-ai fixes the buffer overflow in RSAREF rsaglue code.
patch-ai fixes the buffer overflow in RSAREF rsaglue code.
patch-aj fixes a bug which allowed for unencrypted sessions.
OpenSSH (integrated into OpenBSD-2.6) does not have this bug.
OpenSSH (integrated since OpenBSD 2.6) does not have these bugs.