First published: Fri Jul 15 2011(Updated: )
Cross-site scripting (XSS) vulnerability in the chg_passwd function in web/swat.c in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.10 allows remote authenticated administrators to inject arbitrary web script or HTML via the username parameter to the passwd program (aka the user field to the Change Password page).
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Samba Samba | >=3.0.0<3.3.16 | |
Samba Samba | >=3.4.0<3.4.14 | |
Samba Samba | >=3.5.0<3.5.10 | |
Canonical Ubuntu Linux | =10.10 | |
Canonical Ubuntu Linux | =11.04 | |
Canonical Ubuntu Linux | =8.04 | |
Canonical Ubuntu Linux | =10.04 | |
Debian Debian Linux | =5.0 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =6.0 | |
redhat/samba | <3.5.10 | 3.5.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.