mirror of
https://github.com/hashcat/hashcat.git
synced 2024-11-26 18:08:20 +00:00
Fixed buffer overflow in plaintext parsing code: Leading to segfault
This commit is contained in:
parent
b3067680a7
commit
e3ad2f9b7d
@ -23,6 +23,7 @@
|
|||||||
##
|
##
|
||||||
|
|
||||||
- Fixed buffer overflow in status screen display in case of long non-utf8 string
|
- Fixed buffer overflow in status screen display in case of long non-utf8 string
|
||||||
|
- Fixed buffer overflow in plaintext parsing code: Leading to segfault
|
||||||
- Fixed custom char parsing code in maskfiles in --increment mode: Custom charset wasn't used
|
- Fixed custom char parsing code in maskfiles in --increment mode: Custom charset wasn't used
|
||||||
- Fixed display screen to show input queue when using custom charset or rules
|
- Fixed display screen to show input queue when using custom charset or rules
|
||||||
- Fixed double fclose() using AMDGPU-Pro on sysfs compatible platform: Leading to segfault
|
- Fixed double fclose() using AMDGPU-Pro on sysfs compatible platform: Leading to segfault
|
||||||
|
@ -13045,7 +13045,7 @@ int plaintext_parse_hash (u8 *input_buf, u32 input_len, hash_t *hash_buf, MAYBE_
|
|||||||
|
|
||||||
memset (digest, 0, hashconfig->dgst_size);
|
memset (digest, 0, hashconfig->dgst_size);
|
||||||
|
|
||||||
memcpy (digest + 64, input_buf, input_len);
|
memcpy (digest + 16, input_buf, input_len);
|
||||||
|
|
||||||
//strncpy ((char *) digest + 64, (char *) input_buf, 64);
|
//strncpy ((char *) digest + 64, (char *) input_buf, 64);
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user