From 9a87d5aa01d9aa3f39f9ee12dd35cae6e6faab05 Mon Sep 17 00:00:00 2001 From: Jens Steube Date: Tue, 27 Apr 2021 19:55:30 +0200 Subject: [PATCH] Fixed out-of-boundary reads in case user activates -S for fast but pure hashes in -a 1 or -a 3 mode --- docs/changes.txt | 1 + src/backend.c | 4 +++- 2 files changed, 4 insertions(+), 1 deletion(-) diff --git a/docs/changes.txt b/docs/changes.txt index e7cc027c3..f820cb860 100644 --- a/docs/changes.txt +++ b/docs/changes.txt @@ -46,6 +46,7 @@ - Fixed incorrect maximum password length support for -m 400 in optimized mode (reduced from 55 to 39) - Fixed internal access on module option attribute OPTS_TYPE_SUGGEST_KG with the result that it was unused - Fixed invalid handling of outfile folder entries for -m 22000 +- Fixed out-of-boundary reads in case user activates -S for fast but pure hashes in -a 1 or -a 3 mode - Fixed password reassembling for cracked hashes on host for slow hashes in optimized mode that are longer than 32 characters - Fixed race condition in potfile check during removal of empty hashes - Fixed race condition resulting in out of memory error on startup if multiple hashcat instances are started at the same time diff --git a/src/backend.c b/src/backend.c index 444796f10..515ec7ca8 100644 --- a/src/backend.c +++ b/src/backend.c @@ -10613,7 +10613,9 @@ int backend_session_begin (hashcat_ctx_t *hashcat_ctx) // this is required because inside the kernels there is this: // __local pw_t s_pws[64]; - if ((user_options->attack_mode == ATTACK_MODE_STRAIGHT) || (user_options->attack_mode == ATTACK_MODE_ASSOCIATION)) + if ((user_options->attack_mode == ATTACK_MODE_STRAIGHT) + || (user_options->attack_mode == ATTACK_MODE_ASSOCIATION) + || (user_options->slow_candidates == true)) { if (hashconfig->attack_exec == ATTACK_EXEC_INSIDE_KERNEL) {