First published: Fri Jul 15 2011(Updated: )
Cross-site scripting (XSS) vulnerability in the chg_passwd function in web/swat.c in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.10 allows remote authenticated administrators to inject arbitrary web script or HTML via the username parameter to the passwd program (aka the user field to the Change Password page).
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/samba | <3.5.10 | 3.5.10 |
Samba | >=3.0.0<3.3.16 | |
Samba | >=3.4.0<3.4.14 | |
Samba | >=3.5.0<3.5.10 | |
Ubuntu Linux | =10.10 | |
Ubuntu Linux | =11.04 | |
Ubuntu Linux | =8.04 | |
Ubuntu Linux | =10.04 | |
Debian Debian Linux | =5.0 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.