From ac61e4aee2a263de6a882e3ff125b4b65a652a2b Mon Sep 17 00:00:00 2001 From: Luke Leighton Date: Mon, 12 Jul 1999 18:57:05 +0000 Subject: lengths of NT passwords when "encrypt passwords = no" can be completely random. values seen can be as high as 18255. this fails the check of <= 24 which sets NT password length to 0, effectively ignoring it. the <= 24 was removed in reply_sesssetup_X. (This used to be commit 98d43b20dc4df72ddbfaeb34581222adc53d15dd) --- source3/smbd/reply.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'source3/smbd') diff --git a/source3/smbd/reply.c b/source3/smbd/reply.c index 652d6e4795..bfa68ab140 100644 --- a/source3/smbd/reply.c +++ b/source3/smbd/reply.c @@ -605,7 +605,7 @@ user %s attempted down-level SMB connection\n", user)); setting passlen2 to some random value which really stuffs things up. we need to fix that one. */ - if (passlen1 > 0 && passlen2 > 0 && passlen2 <= 24 && passlen2 != 1) + if (passlen1 > 0 && passlen2 > 0 && passlen2 != 1) passlen2 = 0; } -- cgit