summaryrefslogtreecommitdiff
path: root/source3/include
diff options
context:
space:
mode:
authorJeremy Allison <jra@samba.org>2008-05-28 09:31:42 -0700
committerJeremy Allison <jra@samba.org>2008-05-28 09:31:42 -0700
commitd36434f31268b75040311352f23c92c9a61e8cda (patch)
treefc19fb649d4a6ecf29f43b872975c7f6eeaeebd3 /source3/include
parent611072fc1cd94e6c9d56ce910fd13f007f6ecb84 (diff)
downloadsamba-d36434f31268b75040311352f23c92c9a61e8cda.tar.gz
samba-d36434f31268b75040311352f23c92c9a61e8cda.tar.bz2
samba-d36434f31268b75040311352f23c92c9a61e8cda.zip
Security fix for CVE-2008-1105: Boundary failure when parsing SMB responses
can result in a buffer overrun. Jeremy. (This used to be commit 23b825e9d2c74c5b940cf4d3aa56c18692259972)
Diffstat (limited to 'source3/include')
-rw-r--r--source3/include/proto.h8
1 files changed, 6 insertions, 2 deletions
diff --git a/source3/include/proto.h b/source3/include/proto.h
index 36d75a4d75..761c720497 100644
--- a/source3/include/proto.h
+++ b/source3/include/proto.h
@@ -1582,8 +1582,12 @@ NTSTATUS read_smb_length_return_keepalive(int fd, char *inbuf,
size_t *len);
NTSTATUS read_smb_length(int fd, char *inbuf, unsigned int timeout,
size_t *len);
-NTSTATUS receive_smb_raw(int fd, char *buffer, unsigned int timeout,
- size_t maxlen, size_t *p_len);
+NTSTATUS receive_smb_raw(int fd,
+ char *buffer,
+ size_t buflen,
+ unsigned int timeout,
+ size_t maxlen,
+ size_t *p_len);
int open_socket_in(int type,
uint16_t port,
int dlevel,