CVE-2011-2522

NameCVE-2011-2522
DescriptionMultiple cross-site request forgery (CSRF) vulnerabilities in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.10 allow remote attackers to hijack the authentication of administrators for requests that (1) shut down daemons, (2) start daemons, (3) add shares, (4) remove shares, (5) add printers, (6) remove printers, (7) add user accounts, or (8) remove user accounts, as demonstrated by certain start, stop, and restart parameters to the status program.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-2290-1
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
samba (PTS)wheezy2:3.6.6-6+deb7u7fixed
wheezy (security)2:3.6.6-6+deb7u10fixed
jessie2:4.1.17+dfsg-2+deb8u2fixed
jessie (security)2:4.2.10+dfsg-0+deb8u3fixed
stretch, sid2:4.4.5+dfsg-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
sambasource(unstable)2:3.5.10~dfsg-1low
sambasourcelenny2:3.2.5-4lenny15mediumDSA-2290-1
sambasourcesqueeze2:3.5.6~dfsg-3squeeze5mediumDSA-2290-1

Search for package or bug name: Reporting problems