3874e6995b
CVE-2008-1105. Specifically crafted SMB responses can result in a heap overflow in the Samba client code. Because the server process, smbd, can itself act as a client during operations such as printer notification and domain authentication, this issue affects both Samba client and server installations. Feedback from sthen@ ok mbalmer@ sthen@
13 lines
554 B
Plaintext
13 lines
554 B
Plaintext
$OpenBSD: patch-smbd_chgpasswd_c,v 1.4 2008/07/11 11:40:33 brad Exp $
|
|
--- smbd/chgpasswd.c.orig Wed May 28 08:41:11 2008
|
|
+++ smbd/chgpasswd.c Thu Jul 3 05:06:29 2008
|
|
@@ -228,7 +228,7 @@ static int dochild(int master, const char *slavedev, c
|
|
passwordprogram));
|
|
|
|
/* execl() password-change application */
|
|
- if (execle("/bin/sh", "sh", "-c", passwordprogram, NULL, eptrs) < 0)
|
|
+ if (execle("/bin/sh", "sh", "-c", passwordprogram, (void *)NULL, eptrs) < 0)
|
|
{
|
|
DEBUG(3, ("Bad status returned from %s\n", passwordprogram));
|
|
return (False);
|