*
*
* IDENTIFICATION
- * $Header: /cvsroot/pgsql/src/backend/libpq/auth.c,v 1.86 2002/08/29 03:22:01 tgl Exp $
+ * $Header: /cvsroot/pgsql/src/backend/libpq/auth.c,v 1.87 2002/08/29 21:50:36 momjian Exp $
*
*-------------------------------------------------------------------------
*/
if (pq_eof() == EOF || pq_getint(&len, 4) == EOF)
return STATUS_EOF; /* client didn't want to send password */
+ /*
+ * Since the remote client has not yet been authenticated, we need
+ * to be careful when using the data they send us. The 8K limit is
+ * arbitrary, and somewhat bogus: the intent is to ensure we don't
+ * allocate an enormous chunk of memory.
+ */
+
+ if (len < 1 || len > 8192)
+ {
+ elog(LOG, "Invalid password packet length: %d; "
+ "must satisfy 1 <= length <= 8192", len);
+ return STATUS_EOF;
+ }
+
initStringInfo(&buf);
if (pq_getstr(&buf) == EOF) /* receive password */
{