summaryrefslogtreecommitdiffstats
path: root/source/smbd/reply.c
diff options
context:
space:
mode:
authorLuke Leighton <lkcl@samba.org>1999-07-12 18:57:05 +0000
committerLuke Leighton <lkcl@samba.org>1999-07-12 18:57:05 +0000
commit98d43b20dc4df72ddbfaeb34581222adc53d15dd (patch)
tree32398a6d6e24bf7c4b773b1abf0cd2372946c8da /source/smbd/reply.c
parent270981960bb5aab52d2f8e494827101ece6729c4 (diff)
downloadsamba-98d43b20dc4df72ddbfaeb34581222adc53d15dd.tar.gz
samba-98d43b20dc4df72ddbfaeb34581222adc53d15dd.tar.xz
samba-98d43b20dc4df72ddbfaeb34581222adc53d15dd.zip
lengths of NT passwords when "encrypt passwords = no" can be completely
random. values seen can be as high as 18255. this fails the check of <= 24 which sets NT password length to 0, effectively ignoring it. the <= 24 was removed in reply_sesssetup_X.
Diffstat (limited to 'source/smbd/reply.c')
-rw-r--r--source/smbd/reply.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/source/smbd/reply.c b/source/smbd/reply.c
index 652d6e47958..bfa68ab1400 100644
--- a/source/smbd/reply.c
+++ b/source/smbd/reply.c
@@ -605,7 +605,7 @@ user %s attempted down-level SMB connection\n", user));
setting passlen2 to some random value which really stuffs
things up. we need to fix that one. */
- if (passlen1 > 0 && passlen2 > 0 && passlen2 <= 24 && passlen2 != 1)
+ if (passlen1 > 0 && passlen2 > 0 && passlen2 != 1)
passlen2 = 0;
}