From Mageia wiki
Jump to: navigation, search

MGASA-2013-0035

Date: February 6th, 2013
Affected releases: 2
Media: Core


Description:
Updated samba packages fix security vulnerabilities:

Samba versions before 3.6.11 and 4.0.2 are vulnerable to clickjacking in
the Samba Web Administration Tool (SWAT). When the SWAT pages are
integrated into a malicious web page via a frame or iframe and then
overlaid by other content, an attacker could trick an administrator to
potentially change Samba settings (CVE-2013-0213).

Samba versions before 3.6.11 and 4.0.2 are vulnerable to a cross-site
request forgery in the Samba Web Administration Tool (SWAT). By guessing
a user's password and then tricking a user who is authenticated with SWAT
into clicking a manipulated URL on a different web page, it is possible to
manipulate SWAT (CVE-2013-0214).


Updated Packages:
i586:
libnetapi0-3.6.5-2.1.mga2.i586.rpm
libnetapi-devel-3.6.5-2.1.mga2.i586.rpm
libsmbclient0-3.6.5-2.1.mga2.i586.rpm
libsmbclient0-devel-3.6.5-2.1.mga2.i586.rpm
libsmbclient0-static-devel-3.6.5-2.1.mga2.i586.rpm
libsmbsharemodes0-3.6.5-2.1.mga2.i586.rpm
libsmbsharemodes-devel-3.6.5-2.1.mga2.i586.rpm
libwbclient0-3.6.5-2.1.mga2.i586.rpm
libwbclient-devel-3.6.5-2.1.mga2.i586.rpm
nss_wins-3.6.5-2.1.mga2.i586.rpm
samba-client-3.6.5-2.1.mga2.i586.rpm
samba-common-3.6.5-2.1.mga2.i586.rpm
samba-doc-3.6.5-2.1.mga2.noarch.rpm
samba-domainjoin-gui-3.6.5-2.1.mga2.i586.rpm
samba-server-3.6.5-2.1.mga2.i586.rpm
samba-swat-3.6.5-2.1.mga2.i586.rpm
samba-virusfilter-clamav-3.6.5-2.1.mga2.i586.rpm
samba-virusfilter-fsecure-3.6.5-2.1.mga2.i586.rpm
samba-virusfilter-sophos-3.6.5-2.1.mga2.i586.rpm
samba-winbind-3.6.5-2.1.mga2.i586.rpm
samba-debug-3.6.5-2.1.mga2.i586.rpm

x86_64:
lib64netapi0-3.6.5-2.1.mga2.x86_64.rpm
lib64netapi-devel-3.6.5-2.1.mga2.x86_64.rpm
lib64smbclient0-3.6.5-2.1.mga2.x86_64.rpm
lib64smbclient0-devel-3.6.5-2.1.mga2.x86_64.rpm
lib64smbclient0-static-devel-3.6.5-2.1.mga2.x86_64.rpm
lib64smbsharemodes0-3.6.5-2.1.mga2.x86_64.rpm
lib64smbsharemodes-devel-3.6.5-2.1.mga2.x86_64.rpm
lib64wbclient0-3.6.5-2.1.mga2.x86_64.rpm
lib64wbclient-devel-3.6.5-2.1.mga2.x86_64.rpm
nss_wins-3.6.5-2.1.mga2.x86_64.rpm
samba-client-3.6.5-2.1.mga2.x86_64.rpm
samba-common-3.6.5-2.1.mga2.x86_64.rpm
samba-doc-3.6.5-2.1.mga2.noarch.rpm
samba-domainjoin-gui-3.6.5-2.1.mga2.x86_64.rpm
samba-server-3.6.5-2.1.mga2.x86_64.rpm
samba-swat-3.6.5-2.1.mga2.x86_64.rpm
samba-virusfilter-clamav-3.6.5-2.1.mga2.x86_64.rpm
samba-virusfilter-fsecure-3.6.5-2.1.mga2.x86_64.rpm
samba-virusfilter-sophos-3.6.5-2.1.mga2.x86_64.rpm
samba-winbind-3.6.5-2.1.mga2.x86_64.rpm
samba-debug-3.6.5-2.1.mga2.x86_64.rpm

SRPMS:
samba-3.6.5-2.1.mga2.src.rpm


References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0213
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0214
http://www.samba.org/samba/history/samba-3.6.12.html
https://bugs.mageia.org/show_bug.cgi?id=8907