summaryrefslogtreecommitdiff
path: root/source3
diff options
context:
space:
mode:
authorJeremy Allison <jra@samba.org>1998-01-15 04:57:54 +0000
committerJeremy Allison <jra@samba.org>1998-01-15 04:57:54 +0000
commit7ab9d270fe9fcc0360672ff8e163aba985c69aea (patch)
treea9021379906b8da054c8cb3b9678eb2d789ca7ac /source3
parent5dd1eb4e32f95bd1d8f5da3ca30c7a0fc4ef87c0 (diff)
downloadsamba-7ab9d270fe9fcc0360672ff8e163aba985c69aea.tar.gz
samba-7ab9d270fe9fcc0360672ff8e163aba985c69aea.tar.bz2
samba-7ab9d270fe9fcc0360672ff8e163aba985c69aea.zip
reply.c: Added timestamp to attack warning.
server.c: Fixed security=share problem where the vuid was still being looked at. Jeremy. (This used to be commit ab8d615fe2004c3ca93dd2978ba988ea89d7fd74)
Diffstat (limited to 'source3')
-rw-r--r--source3/smbd/reply.c2
-rw-r--r--source3/smbd/server.c2
2 files changed, 3 insertions, 1 deletions
diff --git a/source3/smbd/reply.c b/source3/smbd/reply.c
index 7194f3b144..b1caee10a2 100644
--- a/source3/smbd/reply.c
+++ b/source3/smbd/reply.c
@@ -55,7 +55,7 @@ report a possible attack via the password buffer overflow bug
****************************************************************************/
static void overflow_attack(int len)
{
- DEBUG(0,("ERROR: Invalid password length %d\n", len));
+ DEBUG(0,("%s: ERROR: Invalid password length %d\n", timestring(), len));
DEBUG(0,("your machine may be under attack by a user exploiting an old bug\n"));
DEBUG(0,("Attack was from IP=%s\n", client_addr()));
exit_server("possible attack");
diff --git a/source3/smbd/server.c b/source3/smbd/server.c
index 3c40e9800f..aaf446bdf5 100644
--- a/source3/smbd/server.c
+++ b/source3/smbd/server.c
@@ -4681,6 +4681,8 @@ static int switch_message(int type,char *inbuf,char *outbuf,int size,int bufsize
int flags = smb_messages[match].flags;
/* In share mode security we must ignore the vuid. */
uint16 session_tag = (lp_security() == SEC_SHARE) ? UID_FIELD_INVALID : SVAL(inbuf,smb_uid);
+ /* Ensure this value is replaced in the incoming packet. */
+ SSVAL(inbuf,smb_uid,session_tag);
/* does this protocol need to be run as root? */
if (!(flags & AS_USER))