Fixed out-of-boundary reads in case user activates -S for fast but pure hashes in -a 1 or -a 3 mode

pull/2777/head
Jens Steube 3 years ago
parent 0ba77fe761
commit 9a87d5aa01

@ -46,6 +46,7 @@
- Fixed incorrect maximum password length support for -m 400 in optimized mode (reduced from 55 to 39)
- Fixed internal access on module option attribute OPTS_TYPE_SUGGEST_KG with the result that it was unused
- Fixed invalid handling of outfile folder entries for -m 22000
- Fixed out-of-boundary reads in case user activates -S for fast but pure hashes in -a 1 or -a 3 mode
- Fixed password reassembling for cracked hashes on host for slow hashes in optimized mode that are longer than 32 characters
- Fixed race condition in potfile check during removal of empty hashes
- Fixed race condition resulting in out of memory error on startup if multiple hashcat instances are started at the same time

@ -10613,7 +10613,9 @@ int backend_session_begin (hashcat_ctx_t *hashcat_ctx)
// this is required because inside the kernels there is this:
// __local pw_t s_pws[64];
if ((user_options->attack_mode == ATTACK_MODE_STRAIGHT) || (user_options->attack_mode == ATTACK_MODE_ASSOCIATION))
if ((user_options->attack_mode == ATTACK_MODE_STRAIGHT)
|| (user_options->attack_mode == ATTACK_MODE_ASSOCIATION)
|| (user_options->slow_candidates == true))
{
if (hashconfig->attack_exec == ATTACK_EXEC_INSIDE_KERNEL)
{

Loading…
Cancel
Save