summaryrefslogtreecommitdiff
path: root/libcli/auth/ntlm_check.c
diff options
context:
space:
mode:
authorMatthieu Patou <mat@matws.net>2013-09-19 11:18:32 -0700
committerVolker Lendecke <vl@samba.org>2013-09-20 04:46:47 +0200
commitea3db09f696b199171e78720d95197f458b15e93 (patch)
treedfa3b36b7b63f64da00039636738804ad1d2ee26 /libcli/auth/ntlm_check.c
parentb2b948a1d01982613dc53ac926842f1d144b6841 (diff)
downloadsamba-ea3db09f696b199171e78720d95197f458b15e93.tar.gz
samba-ea3db09f696b199171e78720d95197f458b15e93.tar.bz2
samba-ea3db09f696b199171e78720d95197f458b15e93.zip
libcli: continue to read from the socket even if the size is 0
This is an issue found by Codenomicon, with a malicious packet with 0 bytes UDP payload we will continiously be looping trying to react from the socket event and continiously do nothing as we will bail out thinking that we had a memory allocation error. Original fix comes from Volker Lendecke <vl@samba.org> Signed-off-by: Matthieu Patou <mat@matws.net> Reviewed-by: Volker Lendecke <vl@samba.org> Autobuild-User(master): Volker Lendecke <vl@samba.org> Autobuild-Date(master): Fri Sep 20 04:46:47 CEST 2013 on sn-devel-104
Diffstat (limited to 'libcli/auth/ntlm_check.c')
0 files changed, 0 insertions, 0 deletions