CVE-2019-14833: Use utf8 characters in the unacceptable password
authorAndrew Bartlett <abartlet@samba.org>
Wed, 18 Sep 2019 23:50:01 +0000 (11:50 +1200)
committerKarolin Seeger <kseeger@samba.org>
Tue, 29 Oct 2019 10:04:45 +0000 (10:04 +0000)
This shows that the "check password script" handling has a bug.

BUG: https://bugzilla.samba.org/show_bug.cgi?id=12438
Signed-off-by: Andrew Bartlett <abartlet@samba.org>
selftest/knownfail.d/unacceptable-passwords [new file with mode: 0644]
selftest/target/Samba4.pm

diff --git a/selftest/knownfail.d/unacceptable-passwords b/selftest/knownfail.d/unacceptable-passwords
new file mode 100644 (file)
index 0000000..75fa2fc
--- /dev/null
@@ -0,0 +1 @@
+^samba.tests.samba_tool.user_check_password_script.samba.tests.samba_tool.user_check_password_script.UserCheckPwdTestCase.test_checkpassword_unacceptable\(chgdcpass:local\)
\ No newline at end of file
index 9df9e84ff63e97b11e6d31f6b212f2d99a50fe0a..1310e2ff09f984622647720f0d082d74ba6e2a1e 100755 (executable)
@@ -1882,7 +1882,7 @@ sub provision_chgdcpass($$)
        print "PROVISIONING CHGDCPASS...\n";
        # This environment disallows the use of this password
        # (and also removes the default AD complexity checks)
-       my $unacceptable_password = "widk3Dsle32jxdBdskldsk55klASKQ";
+       my $unacceptable_password = "Paßßword-widk3Dsle32jxdBdskldsk55klASKQ";
        my $extra_smb_conf = "
        check password script = $self->{srcdir}/selftest/checkpassword_arg1.sh ${unacceptable_password}
        allow dcerpc auth level connect:lsarpc = yes