From 81903e95eec0f6f2d284d1bcf4e88a3d6cebf1ae Mon Sep 17 00:00:00 2001 From: Jens Steube Date: Sun, 22 Dec 2019 10:35:40 +0100 Subject: [PATCH] Fix EAPOL temporary buffer overflow in -m 22000 and -m 22001 --- src/modules/module_22000.c | 2 +- src/modules/module_22001.c | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/src/modules/module_22000.c b/src/modules/module_22000.c index 7517c51b5..173c3f377 100644 --- a/src/modules/module_22000.c +++ b/src/modules/module_22000.c @@ -433,7 +433,7 @@ int module_hash_binary_save (MAYBE_UNUSED const hashes_t *hashes, MAYBE_UNUSED c eapol_swapped[64] = 0; eapol_swapped[65] = 0; - char tmp2_buf[384]; + char tmp2_buf[1024]; const int tmp2_len = hex_encode ((const u8 *) eapol_swapped, wpa->eapol_len, (u8 *) tmp2_buf); diff --git a/src/modules/module_22001.c b/src/modules/module_22001.c index deb80e6f3..dc37532d1 100644 --- a/src/modules/module_22001.c +++ b/src/modules/module_22001.c @@ -434,7 +434,7 @@ int module_hash_binary_save (MAYBE_UNUSED const hashes_t *hashes, MAYBE_UNUSED c eapol_swapped[64] = 0; eapol_swapped[65] = 0; - char tmp2_buf[384]; + char tmp2_buf[1024]; const int tmp2_len = hex_encode ((const u8 *) eapol_swapped, wpa->eapol_len, (u8 *) tmp2_buf);