mirror of
https://git.libssh.org/projects/libssh.git
synced 2025-07-25 03:41:56 +03:00
CVE-2025-5449 tests: Reproducer for payload length overrun
Signed-off-by: Jakub Jelen <jjelen@redhat.com> Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
This commit is contained in:
committed by
Andreas Schneider
parent
926d45b6dd
commit
c22bfa792f
@ -1187,6 +1187,61 @@ static void torture_server_sftp_handle_overrun(void **state)
|
|||||||
assert_int_equal(rc, SSH_OK);
|
assert_int_equal(rc, SSH_OK);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static void torture_server_sftp_payload_overrun(void **state)
|
||||||
|
{
|
||||||
|
struct test_server_st *tss = *state;
|
||||||
|
struct torture_state *s = NULL;
|
||||||
|
struct torture_sftp *tsftp = NULL;
|
||||||
|
char name[128] = {0};
|
||||||
|
sftp_session sftp = NULL;
|
||||||
|
sftp_file handle = NULL;
|
||||||
|
ssh_buffer buffer = NULL;
|
||||||
|
uint32_t id, bad_payload_len = 0x7ffffffc;
|
||||||
|
int rc;
|
||||||
|
|
||||||
|
assert_non_null(tss);
|
||||||
|
|
||||||
|
s = tss->state;
|
||||||
|
assert_non_null(s);
|
||||||
|
|
||||||
|
tsftp = s->ssh.tsftp;
|
||||||
|
assert_non_null(tsftp);
|
||||||
|
|
||||||
|
sftp = tsftp->sftp;
|
||||||
|
assert_non_null(sftp);
|
||||||
|
|
||||||
|
/* Open a file for writing */
|
||||||
|
snprintf(name, sizeof(name), "%s/file", tsftp->testdir);
|
||||||
|
handle = sftp_open(sftp, name, O_WRONLY | O_CREAT, 0700);
|
||||||
|
assert_non_null(handle);
|
||||||
|
|
||||||
|
/* Craft an malicious SFTP packet trying to write to the file with
|
||||||
|
* payload_length overrun */
|
||||||
|
buffer = ssh_buffer_new();
|
||||||
|
id = sftp_get_new_id(sftp);
|
||||||
|
assert_non_null(buffer);
|
||||||
|
|
||||||
|
rc = ssh_buffer_pack(buffer,
|
||||||
|
"dbdSqd",
|
||||||
|
bad_payload_len,
|
||||||
|
SSH_FXP_WRITE,
|
||||||
|
id,
|
||||||
|
handle->handle,
|
||||||
|
(uint64_t)0,
|
||||||
|
(uint32_t)0);
|
||||||
|
assert_int_equal(rc, SSH_OK);
|
||||||
|
rc = ssh_channel_write(sftp->channel,
|
||||||
|
ssh_buffer_get(buffer),
|
||||||
|
ssh_buffer_get_len(buffer));
|
||||||
|
assert_int_equal(rc, 29);
|
||||||
|
SSH_BUFFER_FREE(buffer);
|
||||||
|
|
||||||
|
/* We do not get answer for this malformed packet -- just kill the
|
||||||
|
* connection */
|
||||||
|
ssh_string_free(handle->handle);
|
||||||
|
free(handle);
|
||||||
|
}
|
||||||
|
|
||||||
int torture_run_tests(void) {
|
int torture_run_tests(void) {
|
||||||
int rc;
|
int rc;
|
||||||
struct CMUnitTest tests[] = {
|
struct CMUnitTest tests[] = {
|
||||||
@ -1220,6 +1275,9 @@ int torture_run_tests(void) {
|
|||||||
cmocka_unit_test_setup_teardown(torture_server_sftp_handle_overrun,
|
cmocka_unit_test_setup_teardown(torture_server_sftp_handle_overrun,
|
||||||
session_setup_sftp,
|
session_setup_sftp,
|
||||||
session_teardown),
|
session_teardown),
|
||||||
|
cmocka_unit_test_setup_teardown(torture_server_sftp_payload_overrun,
|
||||||
|
session_setup_sftp,
|
||||||
|
session_teardown),
|
||||||
};
|
};
|
||||||
|
|
||||||
ssh_init();
|
ssh_init();
|
||||||
|
Reference in New Issue
Block a user