000021363 - Setting RSA ClearTrust cookie user-defined data via a WAX causes unexpected results

Document created by RSA Customer Support Employee on Jun 16, 2016Last modified by RSA Customer Support Employee on Apr 21, 2017
Version 2Show Document
  • View in full screen mode

Article Content

Article Number000021363
Applies ToRSA ClearTrust Agent 4.0 for Sun ONE Web Server 6.0
RSA ClearTrust Web Agent Extension (WAX) API
Sun Solaris 2.8
Microsoft Windows 2000
Microsoft Internet Information Server (IIS) 5.0
IssueSetting RSA ClearTrust cookie user-defined data via a WAX causes unexpected results
Debug output of execution shows data being added to cookie sometimes has extra unexpected characters appended
In some environments, the Web server crashes when the WAX callback body is executed
CauseWhen using a WAX cookie handler to augment the ClearTrust cookie, the ClearTrust Agent expects the the user-defined data to be null terminated. Specifying the data length as equal to strlen(data), and thereby omitting the null terminator, can cause a data overrun.
ResolutionWhen adding the user-defined data length to the Agent request data, be sure to indicate the data length + 1:

len = strlen(cookie_data);
ct_table_put(ct_request_table, CT_USER_DATA,
cookie_data);

ct_table_put(ct_request_table, CT_USER_DATA_LEN,(void *)(len + 1));

NOTE: The auth_hdr_wax.c included with RSA ClearTrust Agent 4.0 incorrectly shows the following:

ct_table_put(ct_request_table, CT_USER_DATA_LEN,(void *)len);
Legacy Article IDa22553

Attachments

    Outcomes