mirror of
https://github.com/hashcat/hashcat.git
synced 2024-12-22 22:58:30 +00:00
Fixed buffer overflow in -m 4710 in -P mode and only in single hash mode if salt length was larger than 32 byte
This commit is contained in:
parent
7a5f3610ca
commit
092e838cf4
@ -211,7 +211,7 @@ KERNEL_FQ void m04710_sxx (KERN_ATTR_VECTOR ())
|
||||
|
||||
const u32 salt_len = salt_bufs[SALT_POS].salt_len;
|
||||
|
||||
u32x s[8] = { 0 };
|
||||
u32x s[64] = { 0 };
|
||||
|
||||
for (u32 i = 0, idx = 0; i < salt_len; i += 4, idx += 1)
|
||||
{
|
||||
|
@ -42,6 +42,7 @@
|
||||
|
||||
- Fixed both false negative and false positive result in -m 3000 in -a 3 (affected only NVIDIA GPU)
|
||||
- Fixed buffer overflow in -m 1800 in -O mode which is optimized to handle only password candidates up to length 15
|
||||
- Fixed buffer overflow in -m 4710 in -P mode and only in single hash mode if salt length was larger than 32 byte
|
||||
- Fixed incorrect maximum password length support for -m 400 in optimized mode (reduced from 55 to 39)
|
||||
- Fixed internal access on module option attribute OPTS_TYPE_SUGGEST_KG with the result that it was unused
|
||||
- Fixed invalid handling of outfile folder entries for -m 22000
|
||||
|
Loading…
Reference in New Issue
Block a user