(/home/sate/Testcases/c/cve/wireshark-1.2.0/epan/dissectors/packet-ipsec.c) |
| |
| 883 | | | esp_sa_parse_filter(const gchar *sa_src, gint *pt_protocol_typ, gchar **pt_src, gint *pt_src_len, gchar **pt_dst, gint *pt_dst_len, gchar **pt_spi) |
| 884 | | | { |
| 885 | | | gchar *src_string; |
| 886 | | | gchar *dst_string; |
| 887 | | | gchar *spi_string; |
| 888 | | | gint src_len = 0; |
| 889 | | | gint dst_len = 0; |
| 890 | | | gchar *src; |
| 891 | | | gchar *dst; |
| 892 | | | gchar *sa; |
| 893 | | | |
| 894 | | | guint index_end1 = 0; |
| 895 | | | guint index_end2 = 0; |
| 896 | | | |
| 897 | | | esp_sa_remove_white(sa_src,&sa); |
| 898 | [+] | | if(!esp_sa_parse_protocol_typ(sa, 0, pt_protocol_typ, &index_end1)) return FALSE; |
 |
| 899 | | | |
| 900 | | | switch(*pt_protocol_typ) |
Event 8:
*pt_protocol_typ evaluates to 1.
hide
|
|
| 901 | | | { |
| 902 | | | |
| 903 | | | case IPSEC_SA_IPV4 : |
| 904 | | | { |
| 905 | [+] | | if(esp_sa_parse_ipv4addr(sa, index_end1, &src_string, &index_end2)) |
 |
| 906 | | | { |
| 907 | [+] | | if(esp_sa_parse_addr_len(sa, index_end2, pt_src_len, &index_end1)) |
 |
| 908 | | | { |
| 909 | [+] | | if(esp_sa_parse_ipv4addr(sa, index_end1, &dst_string, &index_end2)) |
 |
| 910 | | | { |
| 911 | [+] | | if(esp_sa_parse_addr_len(sa, index_end2, pt_dst_len, &index_end1)) |
 |
| 912 | | | { |
| 913 | [+] | | if(!esp_sa_parse_spi(sa, index_end1, &spi_string, &index_end2)) |
Event 27:
esp_sa_parse_spi() does not initialize spi_string. - This may be because of a failure case or other special case for esp_sa_parse_spi().
hide
|
|
 |
| 914 | | | { |
| 915 | | | g_free(src_string); |
| 916 | | | g_free(dst_string); |
| 917 | | | g_free(spi_string); |
Uninitialized Variable
spi_string was not initialized. The issue can occur if the highlighted code executes. See related event 27. Show: All events | Only primary events |
|
| |