CVE-2020-1472(ZeroLogon): libcli/auth: reject weak client challenges in netlogon_cred...
commitba9110a17d753c63a1d8f3981ba3ef88eae64965
authorStefan Metzmacher <metze@samba.org>
Wed, 16 Sep 2020 14:17:29 +0000 (16 16:17 +0200)
committerStefan Metzmacher <metze@samba.org>
Fri, 18 Sep 2020 11:27:15 +0000 (18 13:27 +0200)
tree19d0539287f089c30a3b85d23e128d0c7f3b9e00
parentfdac15704f9b06cb828a9a94c1bc3b8627ec366d
CVE-2020-1472(ZeroLogon): libcli/auth: reject weak client challenges in netlogon_creds_server_init()

This implements the note from MS-NRPC 3.1.4.1 Session-Key Negotiation:

 7. If none of the first 5 bytes of the client challenge is unique, the
    server MUST fail session-key negotiation without further processing of
    the following steps.

It lets ./zerologon_tester.py from
https://github.com/SecuraBV/CVE-2020-1472.git
report: "Attack failed. Target is probably patched."

BUG: https://bugzilla.samba.org/show_bug.cgi?id=14497

Signed-off-by: Stefan Metzmacher <metze@samba.org>
libcli/auth/credentials.c
libcli/auth/wscript_build