close a small security hole where a malicious challenge could potentially

wreak havoc with info strings.
This commit is contained in:
Bill Currie 2002-07-03 18:29:36 +00:00
parent b81f77803c
commit 73b68e788e

View file

@ -986,6 +986,11 @@ CL_ConnectionlessPacket (void)
if (c == S2C_CHALLENGE) {
Con_Printf ("challenge");
if (cls.state >= ca_connected) {
if (!cls.demoplayback)
Con_Printf ("\nDup challenge received. Ignored.\n");
return;
}
s = MSG_ReadString (net_message);
cls.challenge = atoi (s);