LWN.net Logo

Mageia alert MGASA-2013-0035 (samba)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2013-0035: samba-3.6.5-2.1.mga2 (2/core)
Date:  Wed, 6 Feb 2013 23:22:12 +0100
Message-ID:  <20130206222212.GA18539@valstar.mageia.org>
Archive-link:  Article, Thread

MGASA-2013-0035 Date: February 6th, 2013 Affected releases: 2 Media: Core Description: Updated samba packages fix security vulnerabilities: Samba versions before 3.6.11 and 4.0.2 are vulnerable to clickjacking in the Samba Web Administration Tool (SWAT). When the SWAT pages are integrated into a malicious web page via a frame or iframe and then overlaid by other content, an attacker could trick an administrator to potentially change Samba settings (CVE-2013-0213). Samba versions before 3.6.11 and 4.0.2 are vulnerable to a cross-site request forgery in the Samba Web Administration Tool (SWAT). By guessing a user's password and then tricking a user who is authenticated with SWAT into clicking a manipulated URL on a different web page, it is possible to manipulate SWAT (CVE-2013-0214). Updated Packages: i586: libnetapi0-3.6.5-2.1.mga2.i586.rpm libnetapi-devel-3.6.5-2.1.mga2.i586.rpm libsmbclient0-3.6.5-2.1.mga2.i586.rpm libsmbclient0-devel-3.6.5-2.1.mga2.i586.rpm libsmbclient0-static-devel-3.6.5-2.1.mga2.i586.rpm libsmbsharemodes0-3.6.5-2.1.mga2.i586.rpm libsmbsharemodes-devel-3.6.5-2.1.mga2.i586.rpm libwbclient0-3.6.5-2.1.mga2.i586.rpm libwbclient-devel-3.6.5-2.1.mga2.i586.rpm nss_wins-3.6.5-2.1.mga2.i586.rpm samba-client-3.6.5-2.1.mga2.i586.rpm samba-common-3.6.5-2.1.mga2.i586.rpm samba-doc-3.6.5-2.1.mga2.noarch.rpm samba-domainjoin-gui-3.6.5-2.1.mga2.i586.rpm samba-server-3.6.5-2.1.mga2.i586.rpm samba-swat-3.6.5-2.1.mga2.i586.rpm samba-virusfilter-clamav-3.6.5-2.1.mga2.i586.rpm samba-virusfilter-fsecure-3.6.5-2.1.mga2.i586.rpm samba-virusfilter-sophos-3.6.5-2.1.mga2.i586.rpm samba-winbind-3.6.5-2.1.mga2.i586.rpm samba-debug-3.6.5-2.1.mga2.i586.rpm x86_64: lib64netapi0-3.6.5-2.1.mga2.x86_64.rpm lib64netapi-devel-3.6.5-2.1.mga2.x86_64.rpm lib64smbclient0-3.6.5-2.1.mga2.x86_64.rpm lib64smbclient0-devel-3.6.5-2.1.mga2.x86_64.rpm lib64smbclient0-static-devel-3.6.5-2.1.mga2.x86_64.rpm lib64smbsharemodes0-3.6.5-2.1.mga2.x86_64.rpm lib64smbsharemodes-devel-3.6.5-2.1.mga2.x86_64.rpm lib64wbclient0-3.6.5-2.1.mga2.x86_64.rpm lib64wbclient-devel-3.6.5-2.1.mga2.x86_64.rpm nss_wins-3.6.5-2.1.mga2.x86_64.rpm samba-client-3.6.5-2.1.mga2.x86_64.rpm samba-common-3.6.5-2.1.mga2.x86_64.rpm samba-doc-3.6.5-2.1.mga2.noarch.rpm samba-domainjoin-gui-3.6.5-2.1.mga2.x86_64.rpm samba-server-3.6.5-2.1.mga2.x86_64.rpm samba-swat-3.6.5-2.1.mga2.x86_64.rpm samba-virusfilter-clamav-3.6.5-2.1.mga2.x86_64.rpm samba-virusfilter-fsecure-3.6.5-2.1.mga2.x86_64.rpm samba-virusfilter-sophos-3.6.5-2.1.mga2.x86_64.rpm samba-winbind-3.6.5-2.1.mga2.x86_64.rpm samba-debug-3.6.5-2.1.mga2.x86_64.rpm SRPMS: samba-3.6.5-2.1.mga2.src.rpm References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0213 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0214 http://www.samba.org/samba/history/samba-3.6.12.html https://bugs.mageia.org/show_bug.cgi?id=8907 https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-...


(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds