Skip to content

Commit 8fdbb29

Browse files
committedMar 5, 2020
8236191: Enhance OID processing
Reviewed-by: jnimeh, weijun, ahgross, rhalade
1 parent fa3d79c commit 8fdbb29

File tree

1 file changed

+53
-9
lines changed

1 file changed

+53
-9
lines changed
 

‎src/java.base/share/classes/sun/security/util/ObjectIdentifier.java

+53-9
Original file line numberDiff line numberDiff line change
@@ -52,6 +52,25 @@
5252
*/
5353

5454
public final class ObjectIdentifier implements Serializable {
55+
/*
56+
* The maximum encoded OID length, excluding the ASN.1 encoding tag and
57+
* length.
58+
*
59+
* In theory, there is no maximum size for OIDs. However, there are some
60+
* limitation in practice.
61+
*
62+
* RFC 5280 mandates support for OIDs that have arc elements with values
63+
* that are less than 2^28 (that is, they MUST be between 0 and
64+
* 268,435,455, inclusive), and implementations MUST be able to handle
65+
* OIDs with up to 20 elements (inclusive). Per RFC 5280, an encoded
66+
* OID should be less than 80 bytes for safe interoperability.
67+
*
68+
* This class could be used for protocols other than X.509 certificates.
69+
* To be safe, a relatively large but still reasonable value is chosen
70+
* as the restriction in JDK.
71+
*/
72+
private static final int MAXIMUM_OID_SIZE = 4096; // 2^12
73+
5574
/**
5675
* We use the DER value (no tag, no length) as the internal format
5776
* @serial
@@ -118,7 +137,13 @@ private void readObject(ObjectInputStream is)
118137
if (componentLen > comp.length) {
119138
componentLen = comp.length;
120139
}
140+
141+
// Check the estimated size before it is too later.
142+
checkOidSize(componentLen);
143+
121144
init(comp, componentLen);
145+
} else {
146+
checkOidSize(encoding.length);
122147
}
123148
}
124149

@@ -203,6 +228,8 @@ private ObjectIdentifier(String oid) throws IOException {
203228
}
204229
start = end + 1;
205230
count++;
231+
232+
checkOidSize(pos);
206233
} while (end != -1);
207234

208235
checkCount(count);
@@ -250,11 +277,13 @@ public ObjectIdentifier(DerInputStream in) throws IOException {
250277
);
251278

252279
int len = in.getDefiniteLength();
280+
checkOidSize(len);
253281
if (len > in.available()) {
254-
throw new IOException("ObjectIdentifier() -- length exceeds" +
282+
throw new IOException("ObjectIdentifier length exceeds " +
255283
"data available. Length: " + len + ", Available: " +
256284
in.available());
257285
}
286+
258287
encoding = new byte[len];
259288
in.getBytes(encoding);
260289
check(encoding);
@@ -267,26 +296,32 @@ public ObjectIdentifier(DerInputStream in) throws IOException {
267296
*/
268297
ObjectIdentifier(DerInputBuffer buf) throws IOException {
269298
DerInputStream in = new DerInputStream(buf);
270-
encoding = new byte[in.available()];
299+
int len = in.available();
300+
checkOidSize(len);
301+
302+
encoding = new byte[len];
271303
in.getBytes(encoding);
272304
check(encoding);
273305
}
274306

275-
private void init(int[] components, int length) {
307+
private void init(int[] components, int length) throws IOException {
276308
int pos = 0;
277-
byte[] tmp = new byte[length*5+1]; // +1 for empty input
309+
byte[] tmp = new byte[length * 5 + 1]; // +1 for empty input
278310

279-
if (components[1] < Integer.MAX_VALUE - components[0]*40)
280-
pos += pack7Oid(components[0]*40+components[1], tmp, pos);
281-
else {
311+
if (components[1] < Integer.MAX_VALUE - components[0] * 40) {
312+
pos += pack7Oid(components[0] * 40 + components[1], tmp, pos);
313+
} else {
282314
BigInteger big = BigInteger.valueOf(components[1]);
283-
big = big.add(BigInteger.valueOf(components[0]*40));
315+
big = big.add(BigInteger.valueOf(components[0] * 40));
284316
pos += pack7Oid(big, tmp, pos);
285317
}
286318

287-
for (int i=2; i<length; i++) {
319+
for (int i = 2; i < length; i++) {
288320
pos += pack7Oid(components[i], tmp, pos);
321+
322+
checkOidSize(pos);
289323
}
324+
290325
encoding = new byte[pos];
291326
System.arraycopy(tmp, 0, encoding, 0, pos);
292327
}
@@ -690,4 +725,13 @@ private static void checkOtherComponent(
690725
"oid component #" + (i+1) + " must be non-negative ");
691726
}
692727
}
728+
729+
private static void checkOidSize(int oidLength) throws IOException {
730+
if (oidLength > MAXIMUM_OID_SIZE) {
731+
throw new IOException(
732+
"ObjectIdentifier encoded length exceeds " +
733+
"the restriction in JDK (OId length(>=): " + oidLength +
734+
", Restriction: " + MAXIMUM_OID_SIZE + ")");
735+
}
736+
}
693737
}

0 commit comments

Comments
 (0)
Please sign in to comment.