From 669fda00b75a0d361810429e0ef53f6c740b1727 Mon Sep 17 00:00:00 2001 From: Anatol Belski Date: Sat, 10 Sep 2016 02:39:28 +0200 Subject: [PATCH] Bug #73058 crypt broken when salt is 'too' long --- ext/standard/crypt.c | 8 ------- ext/standard/crypt_blowfish.c | 4 ++++ ext/standard/tests/strings/bug73058.phpt | 29 ++++++++++++++++++++++++ 3 files changed, 33 insertions(+), 8 deletions(-) create mode 100644 ext/standard/tests/strings/bug73058.phpt diff --git a/ext/standard/crypt.c b/ext/standard/crypt.c index 10f19ff113d..1b83d6e1277 100644 --- a/ext/standard/crypt.c +++ b/ext/standard/crypt.c @@ -201,14 +201,6 @@ PHPAPI int php_crypt(const char *password, const int pass_len, const char *salt, salt[5] >= '0' && salt[5] <= '9' && salt[6] == '$') { char output[PHP_MAX_SALT_LEN + 1]; - int k = 7; - - while (isalnum(salt[k]) || '.' == salt[k] || '/' == salt[k]) { - k++; - } - if (k != salt_len) { - return FAILURE; - } memset(output, 0, PHP_MAX_SALT_LEN + 1); diff --git a/ext/standard/crypt_blowfish.c b/ext/standard/crypt_blowfish.c index 3348d0cd27f..5cf306715f1 100644 --- a/ext/standard/crypt_blowfish.c +++ b/ext/standard/crypt_blowfish.c @@ -405,6 +405,10 @@ static int BF_decode(BF_word *dst, const char *src, int size) *dptr++ = ((c3 & 0x03) << 6) | c4; } while (dptr < end); + if (end - dptr == size) { + return -1; + } + while (dptr < end) /* PHP hack */ *dptr++ = 0; diff --git a/ext/standard/tests/strings/bug73058.phpt b/ext/standard/tests/strings/bug73058.phpt new file mode 100644 index 00000000000..f0998502134 --- /dev/null +++ b/ext/standard/tests/strings/bug73058.phpt @@ -0,0 +1,29 @@ +--TEST-- +Bug #73058 crypt broken when salt is 'too' long +--SKIPIF-- + +--FILE-- + +==OK== +--EXPECT-- +string(60) "$2y$07$usesomesillystringforex.u2VJUMLRWaJNuw0Hu2FvCEimdeYVO" +string(60) "$2y$07$usesomesillystringforex.u2VJUMLRWaJNuw0Hu2FvCEimdeYVO" +string(60) "$2y$07$usesomesillystringforuw2Gm1ef7lMsvtzSK2p/14F0q1e8uOCO" +==OK== +