Improve packet reading memory safety #4

Open
opened 2023-12-29 22:17:42 +02:00 by Exynox · 0 comments
Owner

Currently, most network input functions operate on the buffer pointer to read additional data if necessary:

image

This behaviour is unsafe, as it might cause buffer overruns for malformed packets, and should be replaced with some kind of wrapper object that should check the buffer bounds.

Currently, most network input functions operate on the buffer pointer to read additional data if necessary: ![image](/attachments/e7c73822-8699-4b08-8d18-cbd5dff03929) This behaviour is unsafe, as it might cause buffer overruns for malformed packets, and should be replaced with some kind of wrapper object that should check the buffer bounds.
Exynox added the
enhancement
label 2023-12-29 22:17:42 +02:00
Sign in to join this conversation.
No Milestone
No project
No Assignees
1 Participants
Notifications
Due Date
The due date is invalid or out of range. Please use the format 'yyyy-mm-dd'.

No due date set.

Dependencies

No dependencies set.

Reference: metin2/server#4
No description provided.