CVE-2011-2522
29.07.2011, 20:55
Multiple cross-site request forgery (CSRF) vulnerabilities in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.10 allow remote attackers to hijack the authentication of administrators for requests that (1) shut down daemons, (2) start daemons, (3) add shares, (4) remove shares, (5) add printers, (6) remove printers, (7) add user accounts, or (8) remove user accounts, as demonstrated by certain start, stop, and restart parameters to the status program.
Vendor | Product | Version |
---|---|---|
samba | samba | 3.0.0 ≤ 𝑥 < 3.3.16 |
samba | samba | 3.4.0 ≤ 𝑥 < 3.4.14 |
samba | samba | 3.5.0 ≤ 𝑥 < 3.5.10 |
debian | debian_linux | 5.0 |
debian | debian_linux | 6.0 |
debian | debian_linux | 7.0 |
canonical | ubuntu_linux | 8.04 |
canonical | ubuntu_linux | 10.04 |
canonical | ubuntu_linux | 10.10 |
canonical | ubuntu_linux | 11.04 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References