Ignore:
Timestamp:
Jun 9, 2016, 2:17:22 PM (9 years ago)
Author:
Silvan Scherrer
Message:

Samba Server: apply latest security patches to vendor

File:
1 edited

Legend:

Unmodified
Added
Removed
  • vendor/current/source3/auth/auth_util.c

    r860 r919  
    3131#include "lib/winbind_util.h"
    3232#include "passdb.h"
     33#include "../lib/tsocket/tsocket.h"
    3334
    3435#undef DBGC_CLASS
     
    368369                                      DATA_BLOB lm_resp, DATA_BLOB nt_resp)
    369370{
     371        bool allow_raw = lp_raw_ntlmv2_auth();
     372
     373        if (!allow_raw && nt_resp.length >= 48) {
     374                /*
     375                 * NTLMv2_RESPONSE has at least 48 bytes
     376                 * and should only be supported via NTLMSSP.
     377                 */
     378                DEBUG(2,("Rejecting raw NTLMv2 authentication with "
     379                         "user [%s\\%s]\n",
     380                         client_domain, smb_name));
     381                return NT_STATUS_INVALID_PARAMETER;
     382        }
     383
    370384        return make_user_info_map(user_info, smb_name,
    371385                                  client_domain,
Note: See TracChangeset for help on using the changeset viewer.