Commit af18b4cb authored by Benjamin Peterson's avatar Benjamin Peterson

merge 2.7.9 release branch

parents bafef5ad 9e8f523c
...@@ -32,6 +32,12 @@ CR = '\r' ...@@ -32,6 +32,12 @@ CR = '\r'
LF = '\n' LF = '\n'
CRLF = CR+LF CRLF = CR+LF
# maximal line length when calling readline(). This is to prevent
# reading arbitrary length lines. RFC 1939 limits POP3 line length to
# 512 characters, including CRLF. We have selected 2048 just to be on
# the safe side.
_MAXLINE = 2048
class POP3: class POP3:
...@@ -103,7 +109,9 @@ class POP3: ...@@ -103,7 +109,9 @@ class POP3:
# Raise error_proto('-ERR EOF') if the connection is closed. # Raise error_proto('-ERR EOF') if the connection is closed.
def _getline(self): def _getline(self):
line = self.file.readline() line = self.file.readline(_MAXLINE + 1)
if len(line) > _MAXLINE:
raise error_proto('line too long')
if self._debugging > 1: print '*get*', repr(line) if self._debugging > 1: print '*get*', repr(line)
if not line: raise error_proto('-ERR EOF') if not line: raise error_proto('-ERR EOF')
octets = len(line) octets = len(line)
...@@ -365,6 +373,8 @@ else: ...@@ -365,6 +373,8 @@ else:
match = renewline.match(self.buffer) match = renewline.match(self.buffer)
while not match: while not match:
self._fillBuffer() self._fillBuffer()
if len(self.buffer) > _MAXLINE:
raise error_proto('line too long')
match = renewline.match(self.buffer) match = renewline.match(self.buffer)
line = match.group(0) line = match.group(0)
self.buffer = renewline.sub('' ,self.buffer, 1) self.buffer = renewline.sub('' ,self.buffer, 1)
......
...@@ -57,6 +57,7 @@ __all__ = ["SMTPException", "SMTPServerDisconnected", "SMTPResponseException", ...@@ -57,6 +57,7 @@ __all__ = ["SMTPException", "SMTPServerDisconnected", "SMTPResponseException",
SMTP_PORT = 25 SMTP_PORT = 25
SMTP_SSL_PORT = 465 SMTP_SSL_PORT = 465
CRLF = "\r\n" CRLF = "\r\n"
_MAXLINE = 8192 # more than 8 times larger than RFC 821, 4.5.3
OLDSTYLE_AUTH = re.compile(r"auth=(.*)", re.I) OLDSTYLE_AUTH = re.compile(r"auth=(.*)", re.I)
...@@ -179,10 +180,14 @@ else: ...@@ -179,10 +180,14 @@ else:
def __init__(self, sslobj): def __init__(self, sslobj):
self.sslobj = sslobj self.sslobj = sslobj
def readline(self): def readline(self, size=-1):
if size < 0:
size = None
str = "" str = ""
chr = None chr = None
while chr != "\n": while chr != "\n":
if size is not None and len(str) >= size:
break
chr = self.sslobj.read(1) chr = self.sslobj.read(1)
if not chr: if not chr:
break break
...@@ -353,7 +358,7 @@ class SMTP: ...@@ -353,7 +358,7 @@ class SMTP:
self.file = self.sock.makefile('rb') self.file = self.sock.makefile('rb')
while 1: while 1:
try: try:
line = self.file.readline() line = self.file.readline(_MAXLINE + 1)
except socket.error as e: except socket.error as e:
self.close() self.close()
raise SMTPServerDisconnected("Connection unexpectedly closed: " raise SMTPServerDisconnected("Connection unexpectedly closed: "
...@@ -363,6 +368,8 @@ class SMTP: ...@@ -363,6 +368,8 @@ class SMTP:
raise SMTPServerDisconnected("Connection unexpectedly closed") raise SMTPServerDisconnected("Connection unexpectedly closed")
if self.debuglevel > 0: if self.debuglevel > 0:
print>>stderr, 'reply:', repr(line) print>>stderr, 'reply:', repr(line)
if len(line) > _MAXLINE:
raise SMTPResponseException(500, "Line too long.")
resp.append(line[4:].strip()) resp.append(line[4:].strip())
code = line[:3] code = line[:3]
# Check that the error code is syntactically correct. # Check that the error code is syntactically correct.
......
...@@ -198,6 +198,10 @@ class TestPOP3Class(TestCase): ...@@ -198,6 +198,10 @@ class TestPOP3Class(TestCase):
113) 113)
self.assertEqual(self.client.retr('foo'), expected) self.assertEqual(self.client.retr('foo'), expected)
def test_too_long_lines(self):
self.assertRaises(poplib.error_proto, self.client._shortcmd,
'echo +%s' % ((poplib._MAXLINE + 10) * 'a'))
def test_dele(self): def test_dele(self):
self.assertOK(self.client.dele('foo')) self.assertOK(self.client.dele('foo'))
......
...@@ -292,6 +292,33 @@ class BadHELOServerTests(unittest.TestCase): ...@@ -292,6 +292,33 @@ class BadHELOServerTests(unittest.TestCase):
HOST, self.port, 'localhost', 3) HOST, self.port, 'localhost', 3)
@unittest.skipUnless(threading, 'Threading required for this test.')
class TooLongLineTests(unittest.TestCase):
respdata = '250 OK' + ('.' * smtplib._MAXLINE * 2) + '\n'
def setUp(self):
self.old_stdout = sys.stdout
self.output = StringIO.StringIO()
sys.stdout = self.output
self.evt = threading.Event()
self.sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
self.sock.settimeout(15)
self.port = test_support.bind_port(self.sock)
servargs = (self.evt, self.respdata, self.sock)
threading.Thread(target=server, args=servargs).start()
self.evt.wait()
self.evt.clear()
def tearDown(self):
self.evt.wait()
sys.stdout = self.old_stdout
def testLineTooLong(self):
self.assertRaises(smtplib.SMTPResponseException, smtplib.SMTP,
HOST, self.port, 'localhost', 3)
sim_users = {'Mr.A@somewhere.com':'John A', sim_users = {'Mr.A@somewhere.com':'John A',
'Ms.B@somewhere.com':'Sally B', 'Ms.B@somewhere.com':'Sally B',
'Mrs.C@somewhereesle.com':'Ruth C', 'Mrs.C@somewhereesle.com':'Ruth C',
...@@ -526,7 +553,8 @@ class SMTPSimTests(unittest.TestCase): ...@@ -526,7 +553,8 @@ class SMTPSimTests(unittest.TestCase):
def test_main(verbose=None): def test_main(verbose=None):
test_support.run_unittest(GeneralTests, DebuggingServerTests, test_support.run_unittest(GeneralTests, DebuggingServerTests,
NonConnectingTests, NonConnectingTests,
BadHELOServerTests, SMTPSimTests) BadHELOServerTests, SMTPSimTests,
TooLongLineTests)
if __name__ == '__main__': if __name__ == '__main__':
test_main() test_main()
...@@ -737,7 +737,7 @@ class GzipServerTestCase(BaseServerTestCase): ...@@ -737,7 +737,7 @@ class GzipServerTestCase(BaseServerTestCase):
with cm: with cm:
p.pow(6, 8) p.pow(6, 8)
def test_gsip_response(self): def test_gzip_response(self):
t = self.Transport() t = self.Transport()
p = xmlrpclib.ServerProxy(URL, transport=t) p = xmlrpclib.ServerProxy(URL, transport=t)
old = self.requestHandler.encode_threshold old = self.requestHandler.encode_threshold
...@@ -750,6 +750,23 @@ class GzipServerTestCase(BaseServerTestCase): ...@@ -750,6 +750,23 @@ class GzipServerTestCase(BaseServerTestCase):
self.requestHandler.encode_threshold = old self.requestHandler.encode_threshold = old
self.assertTrue(a>b) self.assertTrue(a>b)
def test_gzip_decode_limit(self):
max_gzip_decode = 20 * 1024 * 1024
data = '\0' * max_gzip_decode
encoded = xmlrpclib.gzip_encode(data)
decoded = xmlrpclib.gzip_decode(encoded)
self.assertEqual(len(decoded), max_gzip_decode)
data = '\0' * (max_gzip_decode + 1)
encoded = xmlrpclib.gzip_encode(data)
with self.assertRaisesRegexp(ValueError,
"max gzipped payload length exceeded"):
xmlrpclib.gzip_decode(encoded)
xmlrpclib.gzip_decode(encoded, max_decode=-1)
#Test special attributes of the ServerProxy object #Test special attributes of the ServerProxy object
class ServerProxyTestCase(unittest.TestCase): class ServerProxyTestCase(unittest.TestCase):
def setUp(self): def setUp(self):
......
...@@ -49,6 +49,7 @@ ...@@ -49,6 +49,7 @@
# 2003-07-12 gp Correct marshalling of Faults # 2003-07-12 gp Correct marshalling of Faults
# 2003-10-31 mvl Add multicall support # 2003-10-31 mvl Add multicall support
# 2004-08-20 mvl Bump minimum supported Python version to 2.1 # 2004-08-20 mvl Bump minimum supported Python version to 2.1
# 2014-12-02 ch/doko Add workaround for gzip bomb vulnerability
# #
# Copyright (c) 1999-2002 by Secret Labs AB. # Copyright (c) 1999-2002 by Secret Labs AB.
# Copyright (c) 1999-2002 by Fredrik Lundh. # Copyright (c) 1999-2002 by Fredrik Lundh.
...@@ -1165,10 +1166,13 @@ def gzip_encode(data): ...@@ -1165,10 +1166,13 @@ def gzip_encode(data):
# in the HTTP header, as described in RFC 1952 # in the HTTP header, as described in RFC 1952
# #
# @param data The encoded data # @param data The encoded data
# @keyparam max_decode Maximum bytes to decode (20MB default), use negative
# values for unlimited decoding
# @return the unencoded data # @return the unencoded data
# @raises ValueError if data is not correctly coded. # @raises ValueError if data is not correctly coded.
# @raises ValueError if max gzipped payload length exceeded
def gzip_decode(data): def gzip_decode(data, max_decode=20971520):
"""gzip encoded data -> unencoded data """gzip encoded data -> unencoded data
Decode data using the gzip content encoding as described in RFC 1952 Decode data using the gzip content encoding as described in RFC 1952
...@@ -1178,11 +1182,16 @@ def gzip_decode(data): ...@@ -1178,11 +1182,16 @@ def gzip_decode(data):
f = StringIO.StringIO(data) f = StringIO.StringIO(data)
gzf = gzip.GzipFile(mode="rb", fileobj=f) gzf = gzip.GzipFile(mode="rb", fileobj=f)
try: try:
decoded = gzf.read() if max_decode < 0: # no limit
decoded = gzf.read()
else:
decoded = gzf.read(max_decode + 1)
except IOError: except IOError:
raise ValueError("invalid data") raise ValueError("invalid data")
f.close() f.close()
gzf.close() gzf.close()
if max_decode >= 0 and len(decoded) > max_decode:
raise ValueError("max gzipped payload length exceeded")
return decoded return decoded
## ##
......
...@@ -52,6 +52,15 @@ What's New in Python 2.7.9? ...@@ -52,6 +52,15 @@ What's New in Python 2.7.9?
Library Library
------- -------
- Issue #16043: Add a default limit for the amount of data xmlrpclib.gzip_decode
will return. This resolves CVE-2013-1753.
- Issue #16042: CVE-2013-1752: smtplib: Limit amount of data read by limiting
the call to readline(). Original patch by Christian Heimes.
- Issue #16041: In poplib, limit maximum line length read from the server to
prevent CVE-2013-1752.
- Issue #22960: Add a context argument to xmlrpclib.ServerProxy. - Issue #22960: Add a context argument to xmlrpclib.ServerProxy.
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment