First published: Fri Jul 15 2011(Updated: )
Cross-site scripting (XSS) vulnerability in the chg_passwd function in web/swat.c in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.10 allows remote authenticated administrators to inject arbitrary web script or HTML via the username parameter to the passwd program (aka the user field to the Change Password page).
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/samba | <3.5.10 | 3.5.10 |
Samba | >=3.0.0<3.3.16 | |
Samba | >=3.4.0<3.4.14 | |
Samba | >=3.5.0<3.5.10 | |
Ubuntu | =10.10 | |
Ubuntu | =11.04 | |
Ubuntu | =8.04 | |
Ubuntu | =10.04 | |
Debian | =5.0 | |
Debian | =7.0 | |
Debian | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2694 is classified as a medium severity vulnerability due to its potential for cross-site scripting exploitation.
To fix CVE-2011-2694, upgrade Samba to version 3.5.10 or later.
CVE-2011-2694 affects Samba versions prior to 3.5.10 across various Linux distributions.
Yes, CVE-2011-2694 can be exploited remotely by authenticated administrators.
CVE-2011-2694 is a cross-site scripting (XSS) vulnerability.