[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[PATCH] gssapi: Set correct state after sending GSSAPI_RESPONSE
[Thread Prev] | [Thread Next]
- Subject: [PATCH] gssapi: Set correct state after sending GSSAPI_RESPONSE
- From: Meng Hourk Tan <mtan@xxxxxxxxxx>
- Reply-to: libssh@xxxxxxxxxx
- Date: Thu, 25 Oct 2018 15:21:56 +0000
- To: "libssh@xxxxxxxxxx" <libssh@xxxxxxxxxx>
Hello, Here's a patch related to changes from CVE-2018-10933: Kerberos Authentication (GSSAPI) as server always fails (on new packet filtering) because SSH_AUTH_STATE_GSSAPI_TOKEN is not correctly set on sending SSH_MSG_USERAUTH_GSSAPI_RESPONSE (containing selected mechanism OID). After this response, the client will send a SSH_MSG_USERAUTH_GSSAPI_TOKEN packet (see rfc4462 3.3-3.4) so the packet filter will check the SSH_AUTH_STATE_GSSAPI_TOKEN auth state. This patch set correct state on sending gssapi response (selected mechanism OID) Regards, Meng
From eb6f2efe8c8995a8d687b108d0a9478b7e9991f1 Mon Sep 17 00:00:00 2001 From: Meng Tan <mtan@xxxxxxxxxx> Date: Thu, 25 Oct 2018 17:06:06 +0200 Subject: [PATCH] gssapi: Set correct state after sending GSSAPI_RESPONSE (select mechanism OID) Signed-off-by: Meng Tan <mtan@xxxxxxxxxx> --- src/gssapi.c | 1 + 1 file changed, 1 insertion(+) diff --git a/src/gssapi.c b/src/gssapi.c index 77df0b59..e1b37c76 100644 --- a/src/gssapi.c +++ b/src/gssapi.c @@ -120,6 +120,7 @@ static int ssh_gssapi_send_response(ssh_session session, ssh_string oid){ ssh_set_error_oom(session); return SSH_ERROR; } + session->auth.state = SSH_AUTH_STATE_GSSAPI_TOKEN; ssh_packet_send(session); SSH_LOG(SSH_LOG_PACKET, -- 2.11.0
Archive administrator: postmaster@lists.cynapses.org