summaryrefslogtreecommitdiff
path: root/epan/dissectors/packet-ntlmssp.c
diff options
context:
space:
mode:
authorEvan Huus <eapache@gmail.com>2013-09-19 17:39:43 +0000
committerEvan Huus <eapache@gmail.com>2013-09-19 17:39:43 +0000
commit606c422d5b909bfe947810357648d8a12dbd8fb9 (patch)
tree072ed524cfe99aacd99a2d3c002eb0ab4f54a873 /epan/dissectors/packet-ntlmssp.c
parent27c4a47c29cf64eb1049d758b5ecbe86f2ddd9d6 (diff)
downloadwireshark-606c422d5b909bfe947810357648d8a12dbd8fb9.tar.gz
Zero the key in ntlmssp, because we don't otherwise fill all of it. I suspect
the tvb_memcpy on the next line should be taking more data, but I don't know enough about the protocol to be sure. This is the least disruptive way to fix the last valgrind error from https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8941 svn path=/trunk/; revision=52145
Diffstat (limited to 'epan/dissectors/packet-ntlmssp.c')
-rw-r--r--epan/dissectors/packet-ntlmssp.c1
1 files changed, 1 insertions, 0 deletions
diff --git a/epan/dissectors/packet-ntlmssp.c b/epan/dissectors/packet-ntlmssp.c
index 5296b03a22..58eb02cfc0 100644
--- a/epan/dissectors/packet-ntlmssp.c
+++ b/epan/dissectors/packet-ntlmssp.c
@@ -1988,6 +1988,7 @@ dissect_ntlmssp_payload(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, voi
/* Encrypted body */
proto_tree_add_item (ntlmssp_tree, hf_ntlmssp_verf_body,
tvb, offset, ntlm_signature_size + ntlm_seq_size, ENC_NA);
+ memset(key, 0, sizeof(key));
tvb_memcpy(tvb, key, offset, ntlm_signature_size + ntlm_seq_size);
/* Try to decrypt */
decrypt_data_payload (tvb, offset+(ntlm_signature_size + ntlm_seq_size), encrypted_block_length-(ntlm_signature_size + ntlm_seq_size), pinfo, ntlmssp_tree, key);