Hi John,
thanks, your explanation helped a lot. However I still don't get why the
code crashes. Please let me use the actual buffer sizes since the ones I
told before were examples. The packet is 49, the local buffer is 15.

When you call tvb_get_nstringz0() you pass in bufsize = 15.
> tvb_get_nstringz0() calls _tvb_get_nstringz()
> check_offset_len() runs to the end of the packet, setting len to 49.
> Since len >= bufsize, it sets limit = bufsize.
> stringlen = tvb_strnlen(tvb, abs_offset, limit - 1) looks at the first 9
> bytes, doesn't find a NUL, returns -1
>

That's a point I don't get. This piece of code (stringlen =
tvb_strnlen(tvb, 0, 14)) actually returns 49. Despite the fact that NULL is
present or not, shouldn't this function fulfill the (limit - 1)? Shouldn't
that return 14 at most?


> stringlen is -1, tvb_memcpy copies over limit (10) bytes into buffer from
> tvb, bytes_copies is set to 10, _tvb_get_nstringz() returns -1.
>

That's where things start to get hairy: stringlen is 49, then the actual
copy starts against buffer, that is only 15 bytes long. Crash.
___________________________________________________________________________
Sent via:    Wireshark-dev mailing list <wireshark-dev@wireshark.org>
Archives:    https://www.wireshark.org/lists/wireshark-dev
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-dev
             mailto:wireshark-dev-requ...@wireshark.org?subject=unsubscribe

Reply via email to