CVE-2013-4408:s4:dcerpc_smb: check for invalid frag_len in send_read_request_continue()
[Samba.git] / source4 / librpc / rpc / dcerpc_smb.c
blob06495b3a3ebb098112b0c5197aff9e8ddd02b959
1 /*
2 Unix SMB/CIFS implementation.
4 dcerpc over SMB transport
6 Copyright (C) Tim Potter 2003
7 Copyright (C) Andrew Tridgell 2003
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>.
23 #include "includes.h"
24 #include "libcli/raw/libcliraw.h"
25 #include "libcli/composite/composite.h"
26 #include "librpc/rpc/dcerpc.h"
27 #include "librpc/rpc/dcerpc_proto.h"
28 #include "librpc/rpc/rpc_common.h"
29 #include "../libcli/smb/smbXcli_base.h"
31 /* transport private information used by SMB pipe transport */
32 struct smb_private {
33 uint16_t fnum;
34 struct smbcli_tree *tree;
35 DATA_BLOB session_key;
36 const char *server_name;
37 bool dead;
42 tell the dcerpc layer that the transport is dead
44 static void pipe_dead(struct dcecli_connection *c, NTSTATUS status)
46 struct smb_private *smb = (struct smb_private *)c->transport.private_data;
48 if (smb->dead) {
49 return;
52 smb->dead = true;
54 if (NT_STATUS_EQUAL(NT_STATUS_UNSUCCESSFUL, status)) {
55 status = NT_STATUS_UNEXPECTED_NETWORK_ERROR;
58 if (NT_STATUS_EQUAL(NT_STATUS_OK, status)) {
59 status = NT_STATUS_END_OF_FILE;
62 if (c->transport.recv_data) {
63 c->transport.recv_data(c, NULL, status);
68 /*
69 this holds the state of an in-flight call
71 struct smb_read_state {
72 struct dcecli_connection *c;
73 struct smbcli_request *req;
74 size_t received;
75 DATA_BLOB data;
76 union smb_read *io;
80 called when a read request has completed
82 static void smb_read_callback(struct smbcli_request *req)
84 struct dcecli_connection *c;
85 struct smb_private *smb;
86 struct smb_read_state *state;
87 union smb_read *io;
88 uint16_t frag_length;
89 NTSTATUS status;
91 state = talloc_get_type(req->async.private_data, struct smb_read_state);
92 smb = talloc_get_type(state->c->transport.private_data, struct smb_private);
93 io = state->io;
94 c = state->c;
96 status = smb_raw_read_recv(state->req, io);
97 if (NT_STATUS_IS_ERR(status)) {
98 talloc_free(state);
99 pipe_dead(c, status);
100 return;
103 state->received += io->readx.out.nread;
105 if (state->received < 16) {
106 DEBUG(0,("dcerpc_smb: short packet (length %d) in read callback!\n",
107 (int)state->received));
108 talloc_free(state);
109 pipe_dead(c, NT_STATUS_INFO_LENGTH_MISMATCH);
110 return;
113 frag_length = dcerpc_get_frag_length(&state->data);
115 if (frag_length <= state->received) {
116 DATA_BLOB data = state->data;
117 data.length = state->received;
118 talloc_steal(state->c, data.data);
119 talloc_free(state);
120 c->transport.recv_data(c, &data, NT_STATUS_OK);
121 return;
124 /* initiate another read request, as we only got part of a fragment */
125 state->data.data = talloc_realloc(state, state->data.data, uint8_t, frag_length);
127 io->readx.in.mincnt = MIN(state->c->srv_max_xmit_frag,
128 frag_length - state->received);
129 io->readx.in.maxcnt = io->readx.in.mincnt;
130 io->readx.out.data = state->data.data + state->received;
132 state->req = smb_raw_read_send(smb->tree, io);
133 if (state->req == NULL) {
134 talloc_free(state);
135 pipe_dead(c, NT_STATUS_NO_MEMORY);
136 return;
139 state->req->async.fn = smb_read_callback;
140 state->req->async.private_data = state;
144 trigger a read request from the server, possibly with some initial
145 data in the read buffer
147 static NTSTATUS send_read_request_continue(struct dcecli_connection *c, DATA_BLOB *blob)
149 struct smb_private *smb = (struct smb_private *)c->transport.private_data;
150 union smb_read *io;
151 struct smb_read_state *state;
152 struct smbcli_request *req;
154 state = talloc(smb, struct smb_read_state);
155 if (state == NULL) {
156 return NT_STATUS_NO_MEMORY;
159 state->c = c;
160 if (blob == NULL) {
161 state->received = 0;
162 state->data = data_blob_talloc(state, NULL, 0x2000);
163 } else {
164 uint32_t frag_length = blob->length>=16?
165 dcerpc_get_frag_length(blob):0x2000;
167 if (frag_length < state->data.length) {
168 talloc_free(state);
169 return NT_STATUS_RPC_PROTOCOL_ERROR;
172 state->received = blob->length;
173 state->data = data_blob_talloc(state, NULL, frag_length);
174 if (!state->data.data) {
175 talloc_free(state);
176 return NT_STATUS_NO_MEMORY;
178 memcpy(state->data.data, blob->data, blob->length);
181 state->io = talloc(state, union smb_read);
183 io = state->io;
184 io->generic.level = RAW_READ_READX;
185 io->readx.in.file.fnum = smb->fnum;
186 io->readx.in.mincnt = state->data.length - state->received;
187 io->readx.in.maxcnt = io->readx.in.mincnt;
188 io->readx.in.offset = 0;
189 io->readx.in.remaining = 0;
190 io->readx.in.read_for_execute = false;
191 io->readx.out.data = state->data.data + state->received;
192 req = smb_raw_read_send(smb->tree, io);
193 if (req == NULL) {
194 return NT_STATUS_NO_MEMORY;
197 req->async.fn = smb_read_callback;
198 req->async.private_data = state;
200 state->req = req;
202 return NT_STATUS_OK;
207 trigger a read request from the server
209 static NTSTATUS send_read_request(struct dcecli_connection *c)
211 struct smb_private *smb = (struct smb_private *)c->transport.private_data;
213 if (smb->dead) {
214 return NT_STATUS_CONNECTION_DISCONNECTED;
217 return send_read_request_continue(c, NULL);
221 this holds the state of an in-flight trans call
223 struct smb_trans_state {
224 struct dcecli_connection *c;
225 struct smbcli_request *req;
226 struct smb_trans2 *trans;
230 called when a trans request has completed
232 static void smb_trans_callback(struct smbcli_request *req)
234 struct smb_trans_state *state = (struct smb_trans_state *)req->async.private_data;
235 struct dcecli_connection *c = state->c;
236 NTSTATUS status;
238 status = smb_raw_trans_recv(req, state, state->trans);
240 if (NT_STATUS_IS_ERR(status)) {
241 pipe_dead(c, status);
242 return;
245 if (!NT_STATUS_EQUAL(status, STATUS_BUFFER_OVERFLOW)) {
246 DATA_BLOB data = state->trans->out.data;
247 talloc_steal(c, data.data);
248 talloc_free(state);
249 c->transport.recv_data(c, &data, NT_STATUS_OK);
250 return;
253 /* there is more to receive - setup a readx */
254 send_read_request_continue(c, &state->trans->out.data);
255 talloc_free(state);
259 send a SMBtrans style request
261 static NTSTATUS smb_send_trans_request(struct dcecli_connection *c, DATA_BLOB *blob)
263 struct smb_private *smb = (struct smb_private *)c->transport.private_data;
264 struct smb_trans2 *trans;
265 uint16_t setup[2];
266 struct smb_trans_state *state;
267 uint16_t max_data;
269 state = talloc(c, struct smb_trans_state);
270 if (state == NULL) {
271 return NT_STATUS_NO_MEMORY;
274 state->c = c;
275 state->trans = talloc(state, struct smb_trans2);
276 trans = state->trans;
278 trans->in.data = *blob;
279 trans->in.params = data_blob(NULL, 0);
281 setup[0] = TRANSACT_DCERPCCMD;
282 setup[1] = smb->fnum;
284 if (c->srv_max_xmit_frag > 0) {
285 max_data = MIN(UINT16_MAX, c->srv_max_xmit_frag);
286 } else {
287 max_data = UINT16_MAX;
290 trans->in.max_param = 0;
291 trans->in.max_data = max_data;
292 trans->in.max_setup = 0;
293 trans->in.setup_count = 2;
294 trans->in.flags = 0;
295 trans->in.timeout = 0;
296 trans->in.setup = setup;
297 trans->in.trans_name = "\\PIPE\\";
299 state->req = smb_raw_trans_send(smb->tree, trans);
300 if (state->req == NULL) {
301 talloc_free(state);
302 return NT_STATUS_NO_MEMORY;
305 state->req->async.fn = smb_trans_callback;
306 state->req->async.private_data = state;
308 talloc_steal(state, state->req);
310 return NT_STATUS_OK;
314 called when a write request has completed
316 static void smb_write_callback(struct smbcli_request *req)
318 struct dcecli_connection *c = (struct dcecli_connection *)req->async.private_data;
319 union smb_write io;
320 NTSTATUS status;
322 ZERO_STRUCT(io);
323 io.generic.level = RAW_WRITE_WRITEX;
325 status = smb_raw_write_recv(req, &io);
326 if (!NT_STATUS_IS_OK(status)) {
327 DEBUG(0,("dcerpc_smb: write callback error: %s\n",
328 nt_errstr(status)));
329 pipe_dead(c, status);
334 send a packet to the server
336 static NTSTATUS smb_send_request(struct dcecli_connection *c, DATA_BLOB *blob,
337 bool trigger_read)
339 struct smb_private *smb = (struct smb_private *)c->transport.private_data;
340 union smb_write io;
341 struct smbcli_request *req;
343 if (!smb || smb->dead) {
344 return NT_STATUS_CONNECTION_DISCONNECTED;
347 if (trigger_read) {
348 return smb_send_trans_request(c, blob);
351 io.generic.level = RAW_WRITE_WRITEX;
352 io.writex.in.file.fnum = smb->fnum;
353 io.writex.in.offset = 0;
354 io.writex.in.wmode = PIPE_START_MESSAGE;
355 io.writex.in.remaining = blob->length;
356 io.writex.in.count = blob->length;
357 io.writex.in.data = blob->data;
359 /* we must not timeout at the smb level for rpc requests, as otherwise
360 signing/sealing can be messed up */
361 smb->tree->session->transport->options.request_timeout = 0;
363 req = smb_raw_write_send(smb->tree, &io);
364 if (req == NULL) {
365 return NT_STATUS_NO_MEMORY;
368 req->async.fn = smb_write_callback;
369 req->async.private_data = c;
371 if (trigger_read) {
372 send_read_request(c);
375 return NT_STATUS_OK;
379 static void free_request(struct smbcli_request *req)
381 talloc_free(req);
385 shutdown SMB pipe connection
387 static NTSTATUS smb_shutdown_pipe(struct dcecli_connection *c, NTSTATUS status)
389 struct smb_private *smb = (struct smb_private *)c->transport.private_data;
390 union smb_close io;
391 struct smbcli_request *req;
393 /* maybe we're still starting up */
394 if (!smb) return status;
396 io.close.level = RAW_CLOSE_CLOSE;
397 io.close.in.file.fnum = smb->fnum;
398 io.close.in.write_time = 0;
399 req = smb_raw_close_send(smb->tree, &io);
400 if (req != NULL) {
401 /* we don't care if this fails, so just free it if it succeeds */
402 req->async.fn = free_request;
405 talloc_free(smb);
406 c->transport.private_data = NULL;
408 return status;
412 return SMB server name (called name)
414 static const char *smb_peer_name(struct dcecli_connection *c)
416 struct smb_private *smb = (struct smb_private *)c->transport.private_data;
417 if (smb == NULL) return "";
418 return smb->server_name;
422 return remote name we make the actual connection (good for kerberos)
424 static const char *smb_target_hostname(struct dcecli_connection *c)
426 struct smb_private *smb = talloc_get_type(c->transport.private_data, struct smb_private);
427 if (smb == NULL) return "";
428 return smbXcli_conn_remote_name(smb->tree->session->transport->conn);
432 fetch the user session key
434 static NTSTATUS smb_session_key(struct dcecli_connection *c, DATA_BLOB *session_key)
436 struct smb_private *smb = (struct smb_private *)c->transport.private_data;
438 if (smb == NULL) return NT_STATUS_CONNECTION_DISCONNECTED;
440 if (smb->session_key.length == 0) {
441 return NT_STATUS_NO_USER_SESSION_KEY;
444 *session_key = smb->session_key;
445 return NT_STATUS_OK;
448 struct pipe_open_smb_state {
449 union smb_open *open;
450 struct dcecli_connection *c;
451 struct smbcli_tree *tree;
452 struct composite_context *ctx;
455 static void pipe_open_recv(struct smbcli_request *req);
457 struct composite_context *dcerpc_pipe_open_smb_send(struct dcerpc_pipe *p,
458 struct smbcli_tree *tree,
459 const char *pipe_name)
461 struct composite_context *ctx;
462 struct pipe_open_smb_state *state;
463 struct smbcli_request *req;
464 struct dcecli_connection *c = p->conn;
466 /* if we don't have a binding on this pipe yet, then create one */
467 if (p->binding == NULL) {
468 NTSTATUS status;
469 const char *r = smbXcli_conn_remote_name(tree->session->transport->conn);
470 char *s;
471 SMB_ASSERT(r != NULL);
472 s = talloc_asprintf(p, "ncacn_np:%s", r);
473 if (s == NULL) return NULL;
474 status = dcerpc_parse_binding(p, s, &p->binding);
475 talloc_free(s);
476 if (!NT_STATUS_IS_OK(status)) {
477 return NULL;
481 ctx = composite_create(c, c->event_ctx);
482 if (ctx == NULL) return NULL;
484 state = talloc(ctx, struct pipe_open_smb_state);
485 if (composite_nomem(state, ctx)) return ctx;
486 ctx->private_data = state;
488 state->c = c;
489 state->tree = tree;
490 state->ctx = ctx;
492 state->open = talloc(state, union smb_open);
493 if (composite_nomem(state->open, ctx)) return ctx;
495 state->open->ntcreatex.level = RAW_OPEN_NTCREATEX;
496 state->open->ntcreatex.in.flags = 0;
497 state->open->ntcreatex.in.root_fid.fnum = 0;
498 state->open->ntcreatex.in.access_mask =
499 SEC_STD_READ_CONTROL |
500 SEC_FILE_WRITE_ATTRIBUTE |
501 SEC_FILE_WRITE_EA |
502 SEC_FILE_READ_DATA |
503 SEC_FILE_WRITE_DATA;
504 state->open->ntcreatex.in.file_attr = 0;
505 state->open->ntcreatex.in.alloc_size = 0;
506 state->open->ntcreatex.in.share_access =
507 NTCREATEX_SHARE_ACCESS_READ |
508 NTCREATEX_SHARE_ACCESS_WRITE;
509 state->open->ntcreatex.in.open_disposition = NTCREATEX_DISP_OPEN;
510 state->open->ntcreatex.in.create_options = 0;
511 state->open->ntcreatex.in.impersonation =
512 NTCREATEX_IMPERSONATION_IMPERSONATION;
513 state->open->ntcreatex.in.security_flags = 0;
515 if ((strncasecmp(pipe_name, "/pipe/", 6) == 0) ||
516 (strncasecmp(pipe_name, "\\pipe\\", 6) == 0)) {
517 pipe_name += 6;
519 state->open->ntcreatex.in.fname =
520 (pipe_name[0] == '\\') ?
521 talloc_strdup(state->open, pipe_name) :
522 talloc_asprintf(state->open, "\\%s", pipe_name);
523 if (composite_nomem(state->open->ntcreatex.in.fname, ctx)) return ctx;
525 req = smb_raw_open_send(tree, state->open);
526 composite_continue_smb(ctx, req, pipe_open_recv, state);
527 return ctx;
530 static void pipe_open_recv(struct smbcli_request *req)
532 struct pipe_open_smb_state *state = talloc_get_type(req->async.private_data,
533 struct pipe_open_smb_state);
534 struct composite_context *ctx = state->ctx;
535 struct dcecli_connection *c = state->c;
536 struct smb_private *smb;
538 ctx->status = smb_raw_open_recv(req, state, state->open);
539 if (!composite_is_ok(ctx)) return;
542 fill in the transport methods
544 c->transport.transport = NCACN_NP;
545 c->transport.private_data = NULL;
546 c->transport.shutdown_pipe = smb_shutdown_pipe;
547 c->transport.peer_name = smb_peer_name;
548 c->transport.target_hostname = smb_target_hostname;
550 c->transport.send_request = smb_send_request;
551 c->transport.send_read = send_read_request;
552 c->transport.recv_data = NULL;
554 /* Over-ride the default session key with the SMB session key */
555 c->security_state.session_key = smb_session_key;
557 smb = talloc(c, struct smb_private);
558 if (composite_nomem(smb, ctx)) return;
560 smb->fnum = state->open->ntcreatex.out.file.fnum;
561 smb->tree = talloc_reference(smb, state->tree);
562 smb->server_name= strupper_talloc(smb,
563 smbXcli_conn_remote_name(state->tree->session->transport->conn));
564 if (composite_nomem(smb->server_name, ctx)) return;
565 smb->dead = false;
567 ctx->status = smbXcli_session_application_key(state->tree->session->smbXcli,
568 smb, &smb->session_key);
569 if (NT_STATUS_EQUAL(ctx->status, NT_STATUS_NO_USER_SESSION_KEY)) {
570 smb->session_key = data_blob_null;
571 ctx->status = NT_STATUS_OK;
573 if (!composite_is_ok(ctx)) return;
575 c->transport.private_data = smb;
577 composite_done(ctx);
580 NTSTATUS dcerpc_pipe_open_smb_recv(struct composite_context *c)
582 NTSTATUS status = composite_wait(c);
583 talloc_free(c);
584 return status;
587 _PUBLIC_ NTSTATUS dcerpc_pipe_open_smb(struct dcerpc_pipe *p,
588 struct smbcli_tree *tree,
589 const char *pipe_name)
591 struct composite_context *ctx = dcerpc_pipe_open_smb_send(p, tree,
592 pipe_name);
593 return dcerpc_pipe_open_smb_recv(ctx);
597 return the SMB tree used for a dcerpc over SMB pipe
599 _PUBLIC_ struct smbcli_tree *dcerpc_smb_tree(struct dcecli_connection *c)
601 struct smb_private *smb;
603 if (c->transport.transport != NCACN_NP) return NULL;
605 smb = talloc_get_type(c->transport.private_data, struct smb_private);
606 if (!smb) return NULL;
608 return smb->tree;
612 return the SMB fnum used for a dcerpc over SMB pipe (hack for torture operations)
614 _PUBLIC_ uint16_t dcerpc_smb_fnum(struct dcecli_connection *c)
616 struct smb_private *smb;
618 if (c->transport.transport != NCACN_NP) return 0;
620 smb = talloc_get_type(c->transport.private_data, struct smb_private);
621 if (!smb) return 0;
623 return smb->fnum;