U programskom paketu Samba otkrivena su dva sigurnosna propusta koje udaljeni napadači mogu iskoristiti za izmjenu parametara i podataka te otkrivanje osjetljivih informacija.
Paket:
Samba 3.x
Operacijski sustavi:
Ubuntu Linux 8.04, Ubuntu Linux 10.04, Ubuntu Linux 10.10, Ubuntu Linux 11.04
Kritičnost:
5.9
Problem:
CSRF, XSS
Iskorištavanje:
udaljeno
Posljedica:
dobivanje većih privilegija, izmjena podataka, otkrivanje osjetljivih informacija
Rješenje:
programska zakrpa proizvođača
CVE:
CVE-2011-2522, CVE-2011-2694
Izvorni ID preporuke:
USN-1182-1
Izvor:
Ubuntu
Problem:
Prvi sigurnosni propust je CSRF (eng. Cross-site request forgery) tipa i nalazi se u komponenti Samba Web Administration Tool. Drugi nedostatak se očituje kao XSS (eng. Cross-site scripting) ranjivost, a otkriven je u funkciji "chg_passwd" u datoteci "web/swat.c".
Posljedica:
Prvu ranjivost udaljeni korisnik može iskoristiti za izmjenu Samba postavki ukoliko administratora navede na otvaranje poveznice na posebno oblikovanoj web stranici. Drugi propust se može zlouporabiti za izmjenu podataka i otkrivanje osjetljivih informacija.
Rješenje:
Korisnicima se savjetuje korištenje službene programske nadogradnje koja otklanja opisane probleme.
==========================================================================
Ubuntu Security Notice USN-1182-1
August 02, 2011
samba vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 11.04
- Ubuntu 10.10
- Ubuntu 10.04 LTS
- Ubuntu 8.04 LTS
Summary:
An attacker could use a malicious URL to reconfigure Samba or steal
information.
Software Description:
- samba: SMB/CIFS file, print, and login server for Unix
Details:
Yoshihiro Ishikawa discovered that the Samba Web Administration Tool (SWAT)
was vulnerable to cross-site request forgeries (CSRF). If a Samba
administrator were tricked into clicking a link on a specially crafted web
page, an attacker could trigger commands that could modify the Samba
configuration. (CVE-2011-2522)
Nobuhiro Tsuji discovered that the Samba Web Administration Tool (SWAT) did
not properly sanitize its input when processing password change requests,
resulting in cross-site scripting (XSS) vulnerabilities. With cross-site
scripting vulnerabilities, if a user were tricked into viewing server
output during a crafted server request, a remote attacker could exploit
this to modify the contents, or steal confidential data, within the same
domain. (CVE-2011-2694)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 11.04:
swat 2:3.5.8~dfsg-1ubuntu2.3
Ubuntu 10.10:
swat 2:3.5.4~dfsg-1ubuntu8.5
Ubuntu 10.04 LTS:
swat 2:3.4.7~dfsg-1ubuntu3.7
Ubuntu 8.04 LTS:
swat 3.0.28a-1ubuntu4.15
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-1182-1
CVE-2011-2522, CVE-2011-2694
Package Information:
https://launchpad.net/ubuntu/+source/samba/2:3.5.8~dfsg-1ubuntu2.3
https://launchpad.net/ubuntu/+source/samba/2:3.5.4~dfsg-1ubuntu8.5
https://launchpad.net/ubuntu/+source/samba/2:3.4.7~dfsg-1ubuntu3.7
https://launchpad.net/ubuntu/+source/samba/3.0.28a-1ubuntu4.15
Posljednje sigurnosne preporuke