diff options
author | Jeremy Allison <jra@samba.org> | 1998-01-13 05:39:25 +0000 |
---|---|---|
committer | Jeremy Allison <jra@samba.org> | 1998-01-13 05:39:25 +0000 |
commit | 281118fcb1b3a3fada40d9b217ffa28fdaaabd0b (patch) | |
tree | 3ea9db5e39f40119cca9cd6022a95200638b0545 | |
parent | fa1573515edb9174651361593bb808ae60e24c6e (diff) | |
download | samba-281118fcb1b3a3fada40d9b217ffa28fdaaabd0b.tar.gz samba-281118fcb1b3a3fada40d9b217ffa28fdaaabd0b.tar.xz samba-281118fcb1b3a3fada40d9b217ffa28fdaaabd0b.zip |
Added timestring() to overflow attack so people can see when it happens.
Jeremy.
-rw-r--r-- | source/smbd/reply.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/source/smbd/reply.c b/source/smbd/reply.c index 7194f3b1446..b1caee10a22 100644 --- a/source/smbd/reply.c +++ b/source/smbd/reply.c @@ -55,7 +55,7 @@ report a possible attack via the password buffer overflow bug ****************************************************************************/ static void overflow_attack(int len) { - DEBUG(0,("ERROR: Invalid password length %d\n", len)); + DEBUG(0,("%s: ERROR: Invalid password length %d\n", timestring(), len)); DEBUG(0,("your machine may be under attack by a user exploiting an old bug\n")); DEBUG(0,("Attack was from IP=%s\n", client_addr())); exit_server("possible attack"); |