Korean
<< Back
VID 23227
Severity 30
Port 139
Protocol TCP
Class Samba
Detailed Description According to its banner, the version of Samba 3.x running on the remote host is earlier than 3.3.16 / 3.4.14 / 3.5.10. As such, it is potentially affected by several vulnerabilities in the Samba Web Administration Tool (SWAT) :

- A cross-site scripting vulnerability exists because of a failure to sanitize input to the username parameter of the 'passwd' program. (Issue #8289)

- A cross-site request forgery (CSRF) vulnerability can allow SWAT to be manipulated when a user who is logged in as root is tricked into clicking specially crafted URLs sent by an attacker. (Issue #8290)

Note that these issues are only exploitable when SWAT it enabled, and it is not enabled by default.

* References:
https://bugzilla.samba.org/show_bug.cgi?id=8289
https://bugzilla.samba.org/show_bug.cgi?id=8290
http://samba.org/samba/security/CVE-2011-2522
http://samba.org/samba/security/CVE-2011-2694
http://www.samba.org/samba/history/samba-3.3.16.html
http://www.samba.org/samba/history/samba-3.4.14.html
http://www.samba.org/samba/history/samba-3.5.10.html

* Platforms Affected:
Samba Project, Samba versions before 3.3.16 / 3.4.14 / 3.5.10
Linux Any version
Unix Any version
Recommendation Upgrade to the latest version of Samba 3.3.16 / 3.4.14 / 3.5.10 or later, available from the Samba Web site at http://us1.samba.org/samba/
Related URL CVE-2011-2522,CVE-2011-2694 (CVE)
Related URL 48899,48901 (SecurityFocus)
Related URL (ISS)