diff options
author | Andrei Karas <akaras@inbox.ru> | 2018-01-16 22:59:16 +0300 |
---|---|---|
committer | Andrei Karas <akaras@inbox.ru> | 2018-01-16 22:59:16 +0300 |
commit | 747bf887a363094d7900d480d5b9904843008e30 (patch) | |
tree | 56f4d2cfceb2e7023380950bb61bc806c94643d6 | |
parent | e462513db20365c4a36e32013a3e48b00a1d2b87 (diff) | |
download | evol-hercules-747bf887a363094d7900d480d5b9904843008e30.tar.gz evol-hercules-747bf887a363094d7900d480d5b9904843008e30.tar.bz2 evol-hercules-747bf887a363094d7900d480d5b9904843008e30.tar.xz evol-hercules-747bf887a363094d7900d480d5b9904843008e30.zip |
Fix possible buffer overflow in md5calc.cs20180208
-rw-r--r-- | src/elogin/md5calc.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/src/elogin/md5calc.c b/src/elogin/md5calc.c index 9bb9460..d5dbed3 100644 --- a/src/elogin/md5calc.c +++ b/src/elogin/md5calc.c @@ -343,7 +343,7 @@ int pass_ok(const char *password, const char *crypted) if (!password || !crypted) return 0; - char buf[40], *salt=buf+1; + char buf[41], *salt = buf + 1; strncpy(buf, crypted, 40); buf[39] = 0; |