=================================================================== RCS file: /cvsrepo/anoncvs/cvs/src/usr.bin/ssh/Attic/sshconnect1.c,v retrieving revision 1.41.2.1 retrieving revision 1.41.2.2 diff -u -r1.41.2.1 -r1.41.2.2 --- src/usr.bin/ssh/Attic/sshconnect1.c 2002/03/07 17:37:48 1.41.2.1 +++ src/usr.bin/ssh/Attic/sshconnect1.c 2002/05/17 00:03:24 1.41.2.2 @@ -13,7 +13,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: sshconnect1.c,v 1.41.2.1 2002/03/07 17:37:48 jason Exp $"); +RCSID("$OpenBSD: sshconnect1.c,v 1.41.2.2 2002/05/17 00:03:24 miod Exp $"); #include #include @@ -459,6 +459,8 @@ /* Get server's response. */ reply = packet_get_string((u_int *) &auth.length); + if (auth.length >= MAX_KTXT_LEN) + fatal("Kerberos v4: Malformed response from server"); memcpy(auth.dat, reply, auth.length); xfree(reply); @@ -843,7 +845,7 @@ error("Permission denied, please try again."); if (options.cipher == SSH_CIPHER_NONE) log("WARNING: Encryption is disabled! " - "Reponse will be transmitted in clear text."); + "Response will be transmitted in clear text."); response = read_passphrase(prompt, 0); if (strcmp(response, "") == 0) { xfree(response);