diff options
author | Stefan Metzmacher <metze@samba.org> | 2020-09-16 16:08:38 +0200 |
---|---|---|
committer | Stefan Metzmacher <metze@samba.org> | 2020-09-18 13:27:15 +0200 |
commit | acf80197316dbea610129dfc9e4b735e7cec0424 (patch) | |
tree | 2424fed00820175906544f2bc5d88de73fc42185 | |
parent | 9d90cd2b50962a63e02ff633b0fa60a3129fbc60 (diff) | |
download | samba-acf80197316dbea610129dfc9e4b735e7cec0424.tar.gz |
CVE-2020-1472(ZeroLogon): libcli/auth: make use of netlogon_creds_random_challenge() in netlogon_creds_cli.c
This will avoid getting rejected by the server if we generate
a weak challenge.
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14497
Signed-off-by: Stefan Metzmacher <metze@samba.org>
-rw-r--r-- | libcli/auth/netlogon_creds_cli.c | 3 |
1 files changed, 1 insertions, 2 deletions
diff --git a/libcli/auth/netlogon_creds_cli.c b/libcli/auth/netlogon_creds_cli.c index 407cb471cbc..12cb3149ff6 100644 --- a/libcli/auth/netlogon_creds_cli.c +++ b/libcli/auth/netlogon_creds_cli.c @@ -1177,8 +1177,7 @@ static void netlogon_creds_cli_auth_challenge_start(struct tevent_req *req) TALLOC_FREE(state->creds); - generate_random_buffer(state->client_challenge.data, - sizeof(state->client_challenge.data)); + netlogon_creds_random_challenge(&state->client_challenge); subreq = dcerpc_netr_ServerReqChallenge_send(state, state->ev, state->binding_handle, |