diff options
author | Andrew Bartlett <abartlet@samba.org> | 2019-09-19 11:50:01 +1200 |
---|---|---|
committer | Karolin Seeger <kseeger@samba.org> | 2019-10-24 12:34:28 +0200 |
commit | e6de467a763b93152eef27726957a32879268fb7 (patch) | |
tree | f9fd841d628a98a51fe5736d57845f22111354da /selftest/target | |
parent | 167f78aa97af6502cb2027dc9dad40399b0a9c4f (diff) | |
download | samba-e6de467a763b93152eef27726957a32879268fb7.tar.gz |
CVE-2019-14833: Use utf8 characters in the unacceptable password
This shows that the "check password script" handling has a bug.
BUG: https://bugzilla.samba.org/show_bug.cgi?id=12438
Signed-off-by: Andrew Bartlett <abartlet@samba.org>
Diffstat (limited to 'selftest/target')
-rwxr-xr-x | selftest/target/Samba4.pm | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/selftest/target/Samba4.pm b/selftest/target/Samba4.pm index b565d466477..d7c22ce4e23 100755 --- a/selftest/target/Samba4.pm +++ b/selftest/target/Samba4.pm @@ -1986,7 +1986,7 @@ sub provision_chgdcpass($$) my $extra_provision_options = undef; # This environment disallows the use of this password # (and also removes the default AD complexity checks) - my $unacceptable_password = "widk3Dsle32jxdBdskldsk55klASKQ"; + my $unacceptable_password = "Paßßword-widk3Dsle32jxdBdskldsk55klASKQ"; push (@{$extra_provision_options}, "--dns-backend=BIND9_DLZ"); my $ret = $self->provision($prefix, "domain controller", |