summaryrefslogtreecommitdiffstats
path: root/source
diff options
context:
space:
mode:
authorJeremy Allison <jra@samba.org>1998-01-13 05:39:25 +0000
committerJeremy Allison <jra@samba.org>1998-01-13 05:39:25 +0000
commit281118fcb1b3a3fada40d9b217ffa28fdaaabd0b (patch)
tree3ea9db5e39f40119cca9cd6022a95200638b0545 /source
parentfa1573515edb9174651361593bb808ae60e24c6e (diff)
downloadsamba-281118fcb1b3a3fada40d9b217ffa28fdaaabd0b.tar.gz
samba-281118fcb1b3a3fada40d9b217ffa28fdaaabd0b.tar.xz
samba-281118fcb1b3a3fada40d9b217ffa28fdaaabd0b.zip
Added timestring() to overflow attack so people can see when it happens.
Jeremy.
Diffstat (limited to 'source')
-rw-r--r--source/smbd/reply.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/source/smbd/reply.c b/source/smbd/reply.c
index 7194f3b1446..b1caee10a22 100644
--- a/source/smbd/reply.c
+++ b/source/smbd/reply.c
@@ -55,7 +55,7 @@ report a possible attack via the password buffer overflow bug
****************************************************************************/
static void overflow_attack(int len)
{
- DEBUG(0,("ERROR: Invalid password length %d\n", len));
+ DEBUG(0,("%s: ERROR: Invalid password length %d\n", timestring(), len));
DEBUG(0,("your machine may be under attack by a user exploiting an old bug\n"));
DEBUG(0,("Attack was from IP=%s\n", client_addr()));
exit_server("possible attack");