From e6de467a763b93152eef27726957a32879268fb7 Mon Sep 17 00:00:00 2001 From: Andrew Bartlett Date: Thu, 19 Sep 2019 11:50:01 +1200 Subject: CVE-2019-14833: Use utf8 characters in the unacceptable password This shows that the "check password script" handling has a bug. BUG: https://bugzilla.samba.org/show_bug.cgi?id=12438 Signed-off-by: Andrew Bartlett --- selftest/knownfail.d/unacceptable-passwords | 1 + selftest/target/Samba4.pm | 2 +- 2 files changed, 2 insertions(+), 1 deletion(-) create mode 100644 selftest/knownfail.d/unacceptable-passwords diff --git a/selftest/knownfail.d/unacceptable-passwords b/selftest/knownfail.d/unacceptable-passwords new file mode 100644 index 00000000000..75fa2fc32b8 --- /dev/null +++ b/selftest/knownfail.d/unacceptable-passwords @@ -0,0 +1 @@ +^samba.tests.samba_tool.user_check_password_script.samba.tests.samba_tool.user_check_password_script.UserCheckPwdTestCase.test_checkpassword_unacceptable\(chgdcpass:local\) \ No newline at end of file diff --git a/selftest/target/Samba4.pm b/selftest/target/Samba4.pm index b565d466477..d7c22ce4e23 100755 --- a/selftest/target/Samba4.pm +++ b/selftest/target/Samba4.pm @@ -1986,7 +1986,7 @@ sub provision_chgdcpass($$) my $extra_provision_options = undef; # This environment disallows the use of this password # (and also removes the default AD complexity checks) - my $unacceptable_password = "widk3Dsle32jxdBdskldsk55klASKQ"; + my $unacceptable_password = "Paßßword-widk3Dsle32jxdBdskldsk55klASKQ"; push (@{$extra_provision_options}, "--dns-backend=BIND9_DLZ"); my $ret = $self->provision($prefix, "domain controller", -- cgit v1.2.1