Ignore:
Timestamp:
Jun 9, 2016, 2:17:22 PM (9 years ago)
Author:
Silvan Scherrer
Message:

Samba Server: apply latest security patches to vendor

Location:
vendor/current/source4/librpc/rpc
Files:
2 edited

Legend:

Unmodified
Added
Removed
  • vendor/current/source4/librpc/rpc/dcerpc.c

    r860 r919  
    700700        default:
    701701                return NT_STATUS_INVALID_LEVEL;
     702        }
     703
     704        if (pkt->auth_length == 0) {
     705                return NT_STATUS_INVALID_NETWORK_RESPONSE;
     706        }
     707
     708        if (c->security_state.generic_state == NULL) {
     709                return NT_STATUS_INTERNAL_ERROR;
    702710        }
    703711
     
    10751083
    10761084        /* the bind_ack might contain a reply set of credentials */
    1077         if (conn->security_state.auth_info && pkt->u.bind_ack.auth_info.length) {
     1085        if (conn->security_state.auth_info && pkt->auth_length) {
    10781086                NTSTATUS status;
    10791087                uint32_t auth_length;
     
    18481856
    18491857        /* the alter_resp might contain a reply set of credentials */
    1850         if (recv_pipe->conn->security_state.auth_info &&
    1851             pkt->u.alter_resp.auth_info.length) {
     1858        if (recv_pipe->conn->security_state.auth_info && pkt->auth_length) {
    18521859                struct dcecli_connection *conn = recv_pipe->conn;
    18531860                NTSTATUS status;
  • vendor/current/source4/librpc/rpc/dcerpc_util.c

    r917 r919  
    594594        /* Perform an authenticated DCE-RPC bind
    595595         */
    596         if (!(conn->flags & (DCERPC_SIGN|DCERPC_SEAL))) {
     596        if (!(conn->flags & (DCERPC_CONNECT|DCERPC_SEAL))) {
    597597                /*
    598598                  we are doing an authenticated connection,
    599                   but not using sign or seal. We must force
    600                   the CONNECT dcerpc auth type as a NONE auth
    601                   type doesn't allow authentication
    602                   information to be passed.
     599                  which needs to use [connect], [sign] or [seal].
     600                  If nothing is specified, we default to [sign] now.
     601                  This give roughly the same protection as
     602                  ncacn_np with smb signing.
    603603                */
    604                 conn->flags |= DCERPC_CONNECT;
     604                conn->flags |= DCERPC_SIGN;
    605605        }
    606606
Note: See TracChangeset for help on using the changeset viewer.