From 7ab9d270fe9fcc0360672ff8e163aba985c69aea Mon Sep 17 00:00:00 2001 From: Jeremy Allison Date: Thu, 15 Jan 1998 04:57:54 +0000 Subject: reply.c: Added timestamp to attack warning. server.c: Fixed security=share problem where the vuid was still being looked at. Jeremy. (This used to be commit ab8d615fe2004c3ca93dd2978ba988ea89d7fd74) --- source3/smbd/reply.c | 2 +- source3/smbd/server.c | 2 ++ 2 files changed, 3 insertions(+), 1 deletion(-) (limited to 'source3') diff --git a/source3/smbd/reply.c b/source3/smbd/reply.c index 7194f3b144..b1caee10a2 100644 --- a/source3/smbd/reply.c +++ b/source3/smbd/reply.c @@ -55,7 +55,7 @@ report a possible attack via the password buffer overflow bug ****************************************************************************/ static void overflow_attack(int len) { - DEBUG(0,("ERROR: Invalid password length %d\n", len)); + DEBUG(0,("%s: ERROR: Invalid password length %d\n", timestring(), len)); DEBUG(0,("your machine may be under attack by a user exploiting an old bug\n")); DEBUG(0,("Attack was from IP=%s\n", client_addr())); exit_server("possible attack"); diff --git a/source3/smbd/server.c b/source3/smbd/server.c index 3c40e9800f..aaf446bdf5 100644 --- a/source3/smbd/server.c +++ b/source3/smbd/server.c @@ -4681,6 +4681,8 @@ static int switch_message(int type,char *inbuf,char *outbuf,int size,int bufsize int flags = smb_messages[match].flags; /* In share mode security we must ignore the vuid. */ uint16 session_tag = (lp_security() == SEC_SHARE) ? UID_FIELD_INVALID : SVAL(inbuf,smb_uid); + /* Ensure this value is replaced in the incoming packet. */ + SSVAL(inbuf,smb_uid,session_tag); /* does this protocol need to be run as root? */ if (!(flags & AS_USER)) -- cgit