freebsd-skq/contrib/tcpdump/print-lane.c
Gleb Smirnoff 3340d77368 Update tcpdump to 4.9.0.
It fixes many buffer overflow in different protocol parsers, but none of
them are critical, even in absense of Capsicum.

Security:	CVE-2016-7922, CVE-2016-7923, CVE-2016-7924, CVE-2016-7925
Security:	CVE-2016-7926, CVE-2016-7927, CVE-2016-7928, CVE-2016-7929
Security:	CVE-2016-7930, CVE-2016-7931, CVE-2016-7932, CVE-2016-7933
Security:	CVE-2016-7934, CVE-2016-7935, CVE-2016-7936, CVE-2016-7937
Security:	CVE-2016-7938, CVE-2016-7939, CVE-2016-7940, CVE-2016-7973
Security:	CVE-2016-7974, CVE-2016-7975, CVE-2016-7983, CVE-2016-7984
Security:	CVE-2016-7985, CVE-2016-7986, CVE-2016-7992, CVE-2016-7993
Security:	CVE-2016-8574, CVE-2016-8575, CVE-2017-5202, CVE-2017-5203
Security:	CVE-2017-5204, CVE-2017-5205, CVE-2017-5341, CVE-2017-5342
Security:	CVE-2017-5482, CVE-2017-5483, CVE-2017-5484, CVE-2017-5485
Security:	CVE-2017-5486
2017-02-01 20:26:42 +00:00

125 lines
3.0 KiB
C

/*
* Marko Kiiskila carnil@cs.tut.fi
*
* Tampere University of Technology - Telecommunications Laboratory
*
* Permission to use, copy, modify and distribute this
* software and its documentation is hereby granted,
* provided that both the copyright notice and this
* permission notice appear in all copies of the software,
* derivative works or modified versions, and any portions
* thereof, that both notices appear in supporting
* documentation, and that the use of this software is
* acknowledged in any publications resulting from using
* the software.
*
* TUT ALLOWS FREE USE OF THIS SOFTWARE IN ITS "AS IS"
* CONDITION AND DISCLAIMS ANY LIABILITY OF ANY KIND FOR
* ANY DAMAGES WHATSOEVER RESULTING FROM THE USE OF THIS
* SOFTWARE.
*
*/
/* \summary: ATM LANE printer */
#ifdef HAVE_CONFIG_H
#include "config.h"
#endif
#include <netdissect-stdinc.h>
#include "netdissect.h"
#include "extract.h"
#include "ether.h"
struct lecdatahdr_8023 {
uint16_t le_header;
uint8_t h_dest[ETHER_ADDR_LEN];
uint8_t h_source[ETHER_ADDR_LEN];
uint16_t h_type;
};
struct lane_controlhdr {
uint16_t lec_header;
uint8_t lec_proto;
uint8_t lec_vers;
uint16_t lec_opcode;
};
static const struct tok lecop2str[] = {
{ 0x0001, "configure request" },
{ 0x0101, "configure response" },
{ 0x0002, "join request" },
{ 0x0102, "join response" },
{ 0x0003, "ready query" },
{ 0x0103, "ready indication" },
{ 0x0004, "register request" },
{ 0x0104, "register response" },
{ 0x0005, "unregister request" },
{ 0x0105, "unregister response" },
{ 0x0006, "ARP request" },
{ 0x0106, "ARP response" },
{ 0x0007, "flush request" },
{ 0x0107, "flush response" },
{ 0x0008, "NARP request" },
{ 0x0009, "topology request" },
{ 0, NULL }
};
static void
lane_hdr_print(netdissect_options *ndo, const u_char *bp)
{
ND_PRINT((ndo, "lecid:%x ", EXTRACT_16BITS(bp)));
}
/*
* This is the top level routine of the printer. 'p' points
* to the LANE header of the packet, 'h->ts' is the timestamp,
* 'h->len' is the length of the packet off the wire, and 'h->caplen'
* is the number of bytes actually captured.
*
* This assumes 802.3, not 802.5, LAN emulation.
*/
void
lane_print(netdissect_options *ndo, const u_char *p, u_int length, u_int caplen)
{
const struct lane_controlhdr *lec;
if (caplen < sizeof(struct lane_controlhdr)) {
ND_PRINT((ndo, "[|lane]"));
return;
}
lec = (const struct lane_controlhdr *)p;
if (EXTRACT_16BITS(&lec->lec_header) == 0xff00) {
/*
* LE Control.
*/
ND_PRINT((ndo, "lec: proto %x vers %x %s",
lec->lec_proto, lec->lec_vers,
tok2str(lecop2str, "opcode-#%u", EXTRACT_16BITS(&lec->lec_opcode))));
return;
}
/*
* Go past the LE header.
*/
length -= 2;
caplen -= 2;
p += 2;
/*
* Now print the encapsulated frame, under the assumption
* that it's an Ethernet frame.
*/
ether_print(ndo, p, length, caplen, lane_hdr_print, p - 2);
}
u_int
lane_if_print(netdissect_options *ndo, const struct pcap_pkthdr *h, const u_char *p)
{
lane_print(ndo, p, h->len, h->caplen);
return (sizeof(struct lecdatahdr_8023));
}