Displaying 3 results from an estimated 3 matches for "buffer_overflow".
2005 Jan 05
1
3.0.10 with printing patch, NULL devmode, failing to fetch tdb and buffer overflow
...devmode(2407)
boing, the devmode was NULL
2. A buffer overflow is logged.
log.smbd:
[2005/01/05 14:02:09, 5] smbd/ipc.c:send_trans_reply(91)
send_trans_reply: buffer 1024 too large
[2005/01/05 14:02:09, 3] smbd/error.c:error_packet(129)
error packet at smbd/ipc.c(99) cmd=37 (SMBtrans) STATUS_BUFFER_OVERFLOW
[2005/01/05 14:02:09, 5] smbd/ipc.c:copy_trans_params_and_data(62)
copy_trans_params_and_data: params[0..0] data[0..1024]
Is this a risk?
Is it possible to avoid this even if the devmode is not set?
Is this the reason for the failed fetching of the tdb?:
[2005/01/05 12:53:03, 0] smbd/connection....
2016 May 02
0
[Announce] Samba 4.3.9 Available for Download
...ild on Solaris.
* BUG 11827: vfs_catia: Fix memleak.
* BUG 11878: smbd: Avoid large reads beyond EOF.
o Stefan Metzmacher <metze at samba.org>
* BUG 11622: libcli/smb: Make sure we have a body size of 0x31 before
dereferencing an ioctl response.
* BUG 11623: libcli/smb: Fix BUFFER_OVERFLOW handling in tstream_smbXcli_np.
* BUG 11755: s3:libads: Setup the msDS-SupportedEncryptionTypes attribute on
ldap_add.
* BUG 11771: tevent: Version 0.9.28. Fix memory leak when old signal action
restored.
* BUG 11782: s3:winbindd: Don't include two '\0' at the end of...
2016 May 02
0
[Announce] Samba 4.3.9 Available for Download
...ild on Solaris.
* BUG 11827: vfs_catia: Fix memleak.
* BUG 11878: smbd: Avoid large reads beyond EOF.
o Stefan Metzmacher <metze at samba.org>
* BUG 11622: libcli/smb: Make sure we have a body size of 0x31 before
dereferencing an ioctl response.
* BUG 11623: libcli/smb: Fix BUFFER_OVERFLOW handling in tstream_smbXcli_np.
* BUG 11755: s3:libads: Setup the msDS-SupportedEncryptionTypes attribute on
ldap_add.
* BUG 11771: tevent: Version 0.9.28. Fix memory leak when old signal action
restored.
* BUG 11782: s3:winbindd: Don't include two '\0' at the end of...