Wireshark mailing list archives
Re: tvb_get_nstringz0
From: Dario Lombardo <lomato () gmail com>
Date: Mon, 29 Mar 2021 09:04:50 +0200
Hi, John, thanks for the follow-up. I have used gdb but I didn't hit any failed assertion. I will file a bug with the test sample and reference you in it so you can have a clearer view of what's going on. On Sun, Mar 28, 2021 at 1:33 AM John Thacker <johnthacker () gmail com> wrote:
On Sat, Mar 27, 2021 at 2:57 PM Dario Lombardo <lomato () gmail com> wrote:Hi John, thanks, your explanation helped a lot. However I still don't get why the code crashes. Please let me use the actual buffer sizes since the ones I told before were examples. The packet is 49, the local buffer is 15. When you call tvb_get_nstringz0() you pass in bufsize = 15.tvb_get_nstringz0() calls _tvb_get_nstringz() check_offset_len() runs to the end of the packet, setting len to 49. Since len >= bufsize, it sets limit = bufsize. stringlen = tvb_strnlen(tvb, abs_offset, limit - 1) looks at the first 9 bytes, doesn't find a NUL, returns -1That's a point I don't get. This piece of code (stringlen = tvb_strnlen(tvb, 0, 14)) actually returns 49. Despite the fact that NULL is present or not, shouldn't this function fulfill the (limit - 1)? Shouldn't that return 14 at most?stringlen is -1, tvb_memcpy copies over limit (10) bytes into buffer from tvb, bytes_copies is set to 10, _tvb_get_nstringz() returns -1.That's where things start to get hairy: stringlen is 49, then the actual copy starts against buffer, that is only 15 bytes long. Crash.Huh, that's odd. I just added some lines to packet-http.c near the top of dissect_http_tcp() like so: guint bufsize = 19; guint8 buffer[19]; tvb_get_nstringz0(tvb, 0, bufsize, buffer); And stepped through with gdb after setting a breakpoint and opening a file with a ~480 byte HTTP packet with no nulls in the HTTP layer: 3578 stringlen = tvb_strnlen(tvb, abs_offset, limit - 1); (gdb) print limit -1 $12 = 18 (gdb) n 3580 if (stringlen == -1) { (gdb) print stringlen $14 = -1 (gdb) print tvb->length $15 = 479 And all proceeds as expected. tvb_strnlen(tvb, offset, maxlength) is supposed to return -1 if 'maxlength' (here, 14) is reached before a NULL. Let's see, tvb_strnlen calls tvb_find_guint8(tvb, abs_offset, maxlength=14, 0), and returns -1 if and only if tvb_find_guint8(...) returns -1. That looks right, so let's look at tvb_find_guint8(): DISSECTOR_ASSERT(tvb && tvb->initialized); exception = compute_offset_and_remaining(tvb, offset, &abs_offset, &limit); if (exception) THROW(exception); /* Only search to end of tvbuff, w/o throwing exception. */ if (maxlength >= 0 && limit > (guint) maxlength) { /* Maximum length doesn't go past end of tvbuff; search to that value. */ limit = (guint) maxlength; } Have you tried stepping through it with a debugger? The code looks right to me and runs correctly over here. Are you perhaps somehow hitting an exception or a failed assertion? John ___________________________________________________________________________ Sent via: Wireshark-dev mailing list <wireshark-dev () wireshark org> Archives: https://www.wireshark.org/lists/wireshark-dev Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-dev mailto:wireshark-dev-request () wireshark org ?subject=unsubscribe
-- Naima is online.
___________________________________________________________________________ Sent via: Wireshark-dev mailing list <wireshark-dev () wireshark org> Archives: https://www.wireshark.org/lists/wireshark-dev Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-dev mailto:wireshark-dev-request () wireshark org?subject=unsubscribe
Current thread:
- tvb_get_nstringz0 Dario Lombardo (Mar 26)
- Re: tvb_get_nstringz0 John Thacker (Mar 26)
- Re: tvb_get_nstringz0 Dario Lombardo (Mar 27)
- Re: tvb_get_nstringz0 John Thacker (Mar 27)
- Re: tvb_get_nstringz0 Dario Lombardo (Mar 29)
- Re: tvb_get_nstringz0 Dario Lombardo (Mar 27)
- Re: tvb_get_nstringz0 John Thacker (Mar 26)