mirror of
https://github.com/samba-team/samba.git
synced 2024-12-23 17:34:34 +03:00
r19502: fixed the RPC-SECRETS test with kerberos. Andrew, can you look at this
as well?
The server side change is needed to fix a valgrind error, which was
possibly exploitable if the client sent deliberately bad data
(This used to be commit e3c04cf165
)
This commit is contained in:
parent
b4a5794e09
commit
bb435cbd03
@ -272,7 +272,6 @@ static NTSTATUS ncacn_pull_request_auth(struct dcerpc_connection *c, TALLOC_CTX
|
||||
return status;
|
||||
}
|
||||
|
||||
|
||||
/* check signature or unseal the packet */
|
||||
switch (c->security_state.auth_info->auth_level) {
|
||||
case DCERPC_AUTH_LEVEL_PRIVACY:
|
||||
@ -433,6 +432,13 @@ static NTSTATUS ncacn_push_request_sign(struct dcerpc_connection *c,
|
||||
return status;
|
||||
}
|
||||
dcerpc_set_auth_length(blob, creds2.length);
|
||||
if (c->security_state.auth_info->credentials.length == 0) {
|
||||
/* this is needed for krb5 only, to correct the total packet
|
||||
length */
|
||||
dcerpc_set_frag_length(blob,
|
||||
dcerpc_get_frag_length(blob)
|
||||
+creds2.length);
|
||||
}
|
||||
break;
|
||||
|
||||
case DCERPC_AUTH_LEVEL_INTEGRITY:
|
||||
@ -454,6 +460,13 @@ static NTSTATUS ncacn_push_request_sign(struct dcerpc_connection *c,
|
||||
return status;
|
||||
}
|
||||
dcerpc_set_auth_length(blob, creds2.length);
|
||||
if (c->security_state.auth_info->credentials.length == 0) {
|
||||
/* this is needed for krb5 only, to correct the total packet
|
||||
length */
|
||||
dcerpc_set_frag_length(blob,
|
||||
dcerpc_get_frag_length(blob)
|
||||
+creds2.length);
|
||||
}
|
||||
break;
|
||||
|
||||
case DCERPC_AUTH_LEVEL_CONNECT:
|
||||
|
@ -470,19 +470,14 @@ BOOL dcesrv_auth_response(struct dcesrv_call_state *call,
|
||||
&creds2);
|
||||
|
||||
if (NT_STATUS_IS_OK(status)) {
|
||||
status = data_blob_realloc(call, blob,
|
||||
blob->length - dce_conn->auth_state.auth_info->credentials.length +
|
||||
creds2.length);
|
||||
}
|
||||
|
||||
if (NT_STATUS_IS_OK(status)) {
|
||||
memcpy(blob->data + blob->length - dce_conn->auth_state.auth_info->credentials.length,
|
||||
creds2.data, creds2.length);
|
||||
blob->length -= dce_conn->auth_state.auth_info->credentials.length;
|
||||
status = data_blob_append(call, blob, creds2.data, creds2.length);
|
||||
}
|
||||
|
||||
/* If we did AEAD signing of the packet headers, then we hope
|
||||
* this value didn't change... */
|
||||
dcerpc_set_auth_length(blob, creds2.length);
|
||||
dcerpc_set_frag_length(blob, dcerpc_get_frag_length(blob)+creds2.length);
|
||||
data_blob_free(&creds2);
|
||||
break;
|
||||
|
||||
@ -495,20 +490,14 @@ BOOL dcesrv_auth_response(struct dcesrv_call_state *call,
|
||||
blob->length - dce_conn->auth_state.auth_info->credentials.length,
|
||||
&creds2);
|
||||
if (NT_STATUS_IS_OK(status)) {
|
||||
status = data_blob_realloc(call, blob,
|
||||
blob->length - dce_conn->auth_state.auth_info->credentials.length +
|
||||
creds2.length);
|
||||
}
|
||||
|
||||
if (NT_STATUS_IS_OK(status)) {
|
||||
memcpy(blob->data + blob->length - dce_conn->auth_state.auth_info->credentials.length,
|
||||
creds2.data, creds2.length);
|
||||
blob->length -= dce_conn->auth_state.auth_info->credentials.length;
|
||||
status = data_blob_append(call, blob, creds2.data, creds2.length);
|
||||
}
|
||||
|
||||
/* If we did AEAD signing of the packet headers, then we hope
|
||||
* this value didn't change... */
|
||||
dcerpc_set_auth_length(blob, creds2.length);
|
||||
|
||||
dcerpc_set_frag_length(blob, dcerpc_get_frag_length(blob)+creds2.length);
|
||||
data_blob_free(&creds2);
|
||||
break;
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user