summaryrefslogtreecommitdiff
path: root/source4/dsdb
diff options
context:
space:
mode:
authorTim Beale <timbeale@catalyst.net.nz>2018-07-20 13:52:24 +1200
committerKarolin Seeger <kseeger@samba.org>2018-08-11 08:16:02 +0200
commit6e35ae37611590cbebabf30c173071f1ee9b9766 (patch)
treefc07334e219c2fcd6ae1a66e28a3a9673b52fb14 /source4/dsdb
parent7016bfd31abc16b6d190ec9b6c9be4b0fb1d3a69 (diff)
downloadsamba-6e35ae37611590cbebabf30c173071f1ee9b9766.tar.gz
CVE-2018-10919 acl_read: Split access_mask logic out into helper function
So we can re-use the same logic laster for checking the search-ops. BUG: https://bugzilla.samba.org/show_bug.cgi?id=13434 Signed-off-by: Tim Beale <timbeale@catalyst.net.nz>
Diffstat (limited to 'source4/dsdb')
-rw-r--r--source4/dsdb/samdb/ldb_modules/acl_read.c54
1 files changed, 35 insertions, 19 deletions
diff --git a/source4/dsdb/samdb/ldb_modules/acl_read.c b/source4/dsdb/samdb/ldb_modules/acl_read.c
index 3c9cf7c0672..f42b131948c 100644
--- a/source4/dsdb/samdb/ldb_modules/acl_read.c
+++ b/source4/dsdb/samdb/ldb_modules/acl_read.c
@@ -227,6 +227,40 @@ static int aclread_get_sd_from_ldb_message(struct aclread_context *ac,
return LDB_SUCCESS;
}
+/*
+ * Returns the access mask required to read a given attribute
+ */
+static uint32_t get_attr_access_mask(const struct dsdb_attribute *attr,
+ uint32_t sd_flags)
+{
+
+ uint32_t access_mask = 0;
+ bool is_sd;
+
+ /* nTSecurityDescriptor is a special case */
+ is_sd = (ldb_attr_cmp("nTSecurityDescriptor",
+ attr->lDAPDisplayName) == 0);
+
+ if (is_sd) {
+ if (sd_flags & (SECINFO_OWNER|SECINFO_GROUP)) {
+ access_mask |= SEC_STD_READ_CONTROL;
+ }
+ if (sd_flags & SECINFO_DACL) {
+ access_mask |= SEC_STD_READ_CONTROL;
+ }
+ if (sd_flags & SECINFO_SACL) {
+ access_mask |= SEC_FLAG_SYSTEM_SECURITY;
+ }
+ } else {
+ access_mask = SEC_ADS_READ_PROP;
+ }
+
+ if (attr->searchFlags & SEARCH_FLAG_CONFIDENTIAL) {
+ access_mask |= SEC_ADS_CONTROL_ACCESS;
+ }
+
+ return access_mask;
+}
static int aclread_callback(struct ldb_request *req, struct ldb_reply *ares)
{
@@ -342,26 +376,8 @@ static int aclread_callback(struct ldb_request *req, struct ldb_reply *ares)
aclread_mark_inaccesslible(&msg->elements[i]);
continue;
}
- /* nTSecurityDescriptor is a special case */
- if (is_sd) {
- access_mask = 0;
-
- if (ac->sd_flags & (SECINFO_OWNER|SECINFO_GROUP)) {
- access_mask |= SEC_STD_READ_CONTROL;
- }
- if (ac->sd_flags & SECINFO_DACL) {
- access_mask |= SEC_STD_READ_CONTROL;
- }
- if (ac->sd_flags & SECINFO_SACL) {
- access_mask |= SEC_FLAG_SYSTEM_SECURITY;
- }
- } else {
- access_mask = SEC_ADS_READ_PROP;
- }
- if (attr->searchFlags & SEARCH_FLAG_CONFIDENTIAL) {
- access_mask |= SEC_ADS_CONTROL_ACCESS;
- }
+ access_mask = get_attr_access_mask(attr, ac->sd_flags);
if (access_mask == 0) {
aclread_mark_inaccesslible(&msg->elements[i]);