Open blockda opened 5 years ago
We found a critical bug when sending text to one of our users previewing the GMCP support the mud MUME. The user's Blowtorch app crashed, and she had to reboot her phone. Obviously, this can be exploited by a malicious user in player killing MUDs so it's somewhat critical that it is fixed and an update be pushed to the app store ASAP.
does do "i++", and it doesn't fall through to
result:
"IAC IAC SB GMCP ... IAC IAC" displays byte 255, and then it processes "IAC SB GMCP ... IAC IAC".
runs out of bounds trying to find "IAC SE", so it throws an exception and crashes.
So we found at least two bugs:
IAC IAC doesn't eat the character.
IAC SB XXX doesn't bounds check when searching for IAC SE
There's no telling what would have happened if I had included the SE,
because it would have processed [IAC] "IAC SB GMCP ... IAC IAC SE". I didn't look to see what happens if it can't "unescape" the payload data.
Reported via email.