CVE-2018-1139 libcli/auth: Do not allow ntlmv1 over SMB1 when it is disabled via...
authorGünther Deschner <gd@samba.org>
Tue, 13 Mar 2018 15:56:20 +0000 (16:56 +0100)
committerKarolin Seeger <kseeger@samba.org>
Tue, 14 Aug 2018 11:57:15 +0000 (13:57 +0200)
commitc25460ee1f1b10bf69eaaf1ac937da225854d1d1
treeaf0ca50a0ff08695f8e614ad6889d381fd9e4a71
parentc88f7795b34eef6d2432f8e9c2fffc14f419dfcd
CVE-2018-1139 libcli/auth: Do not allow ntlmv1 over SMB1 when it is disabled via "ntlm auth".

This fixes a regression that came in via 00db3aba6cf9ebaafdf39ee2f9c7ba5ec2281ea0.

Found by Vivek Das <vdas@redhat.com> (Red Hat QE).

In order to demonstrate simply run:

smbclient //server/share -U user%password -mNT1 -c quit \
--option="client ntlmv2 auth"=no \
--option="client use spnego"=no

against a server that uses "ntlm auth = ntlmv2-only" (our default
setting).

BUG: https://bugzilla.samba.org/show_bug.cgi?id=13360

CVE-2018-1139: Weak authentication protocol allowed.

Guenther

Pair-Programmed-With: Stefan Metzmacher <metze@samba.org>
Signed-off-by: Guenther Deschner <gd@samba.org>
Reviewed-by: Andreas Schneider <asn@samba.org>
Reviewed-by: Jeremy Allison <jra@samba.org>
Reviewed-by: Gary Lockyer <gary@catalyst.net.nz>
libcli/auth/ntlm_check.c
selftest/knownfail
selftest/knownfail.d/ntlm [deleted file]