First published: Thu Jul 14 2011(Updated: )
It was found that the different user screens (HTML forms) of the Samba Web Administration Tool suite were missing protection against cross-site request forgery (CSRF) attacks. A remote attacker could provide a specially-crafted URL, which once visited by an authenticated Samba SWAT user could lead to unauthorized commands execution with the privileges of that user (for example shut down or start the samba daemons, add or remove shares, printers, user accounts if the victim authenticated as privileged user to Samba SWAT). Upstream bug report: [1] <a href="https://bugzilla.samba.org/show_bug.cgi?id=8290">https://bugzilla.samba.org/show_bug.cgi?id=8290</a> (not public yet) Acknowledgements: Red Hat would like to thank the Samba project for reporting this issue. Upstream acknowledges Yoshihiro Ishikawa of LAC Co., Ltd. as the original reporter.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/samba | <3.5.10 | 3.5.10 |
Samba | >=3.0.0<3.3.16 | |
Samba | >=3.4.0<3.4.14 | |
Samba | >=3.5.0<3.5.10 | |
Debian Debian Linux | =5.0 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =6.0 | |
Ubuntu Linux | =10.10 | |
Ubuntu Linux | =11.04 | |
Ubuntu Linux | =8.04 | |
Ubuntu Linux | =10.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.