The Samba-Bugzilla – Attachment 9368 Details for
Bug 10232
winbindd doesn't work against windows 2008 domain controllers
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
[patch]
Patch for v4-1-test
tmp41.diff (text/plain), 2.41 KB, created by
Stefan Metzmacher
on 2013-11-04 14:25:07 UTC
(
hide
)
Description:
Patch for v4-1-test
Filename:
MIME Type:
Creator:
Stefan Metzmacher
Created:
2013-11-04 14:25:07 UTC
Size:
2.41 KB
patch
obsolete
>From c223873e47b617b6b0d64ae64265c7e627450689 Mon Sep 17 00:00:00 2001 >From: Stefan Metzmacher <metze@samba.org> >Date: Mon, 28 Oct 2013 15:43:03 +0100 >Subject: [PATCH] libcli/smb: fix smb2cli_ioctl*() against Windows 2008. > >The subsections of [MS-SMB2] "3.2.5.14 Receiving an SMB2 IOCTL Response" >say the client should ignore the InputOffset/InputCount. > >We do that only if we ask for max_input_length = 0. > >Bug: https://bugzilla.samba.org/show_bug.cgi?id=10232 > >Signed-off-by: Stefan Metzmacher <metze@samba.org> >Reviewed-by: Jeremy Allison <jra@samba.org> > >Autobuild-User(master): Jeremy Allison <jra@samba.org> >Autobuild-Date(master): Thu Oct 31 01:16:10 CET 2013 on sn-devel-104 >(cherry picked from commit 127fc670a39d15eaa3869045fca0287ba7df9efa) >--- > libcli/smb/smb2cli_ioctl.c | 33 +++++++++++++++++++++++++++++---- > 1 file changed, 29 insertions(+), 4 deletions(-) > >diff --git a/libcli/smb/smb2cli_ioctl.c b/libcli/smb/smb2cli_ioctl.c >index 8de7635..3090693 100644 >--- a/libcli/smb/smb2cli_ioctl.c >+++ b/libcli/smb/smb2cli_ioctl.c >@@ -213,7 +213,21 @@ static void smb2cli_ioctl_done(struct tevent_req *subreq) > return; > } > >- if (input_buffer_length < dyn_len) { >+ ofs = input_buffer_length; >+ ofs = NDR_ROUND(ofs, 8); >+ >+ if (state->max_input_length == 0) { >+ /* >+ * If max_input_length is 0 we ignore >+ * the input_buffer_length, because >+ * Windows 2008 echos the DCERPC request >+ * from the requested input_buffer >+ * to the response input_buffer. >+ */ >+ input_buffer_length = 0; >+ } >+ >+ if (input_buffer_length > dyn_len) { > tevent_req_nterror( > req, NT_STATUS_INVALID_NETWORK_RESPONSE); > return; >@@ -228,8 +242,11 @@ static void smb2cli_ioctl_done(struct tevent_req *subreq) > state->out_input_buffer.data = dyn; > state->out_input_buffer.length = input_buffer_length; > >- ofs = input_buffer_length; >- ofs = NDR_ROUND(ofs, 8); >+ if (ofs > dyn_len) { >+ tevent_req_nterror( >+ req, NT_STATUS_INVALID_NETWORK_RESPONSE); >+ return; >+ } > > dyn_ofs += ofs; > dyn += ofs; >@@ -243,7 +260,15 @@ static void smb2cli_ioctl_done(struct tevent_req *subreq) > return; > } > >- if (output_buffer_length < dyn_len) { >+ if (state->max_output_length == 0) { >+ /* >+ * We do the same logic as for >+ * max_input_length. >+ */ >+ output_buffer_length = 0; >+ } >+ >+ if (output_buffer_length > dyn_len) { > tevent_req_nterror( > req, NT_STATUS_INVALID_NETWORK_RESPONSE); > return; >-- >1.7.9.5 >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Flags:
jra
:
review+
Actions:
View
Attachments on
bug 10232
:
9338
|
9354
|
9367
| 9368