![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.70262 |
Kategorie: | FreeBSD Local Security Checks |
Titel: | FreeBSD Ports: samba34 |
Zusammenfassung: | The remote host is missing an update to the system; as announced in the referenced advisory. |
Beschreibung: | Summary: The remote host is missing an update to the system as announced in the referenced advisory. Vulnerability Insight: The following packages are affected: samba34 samba35 CVE-2011-2522 Multiple cross-site request forgery (CSRF) vulnerabilities in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.10 allow remote attackers to hijack the authentication of administrators for requests that (1) shut down daemons, (2) start daemons, (3) add shares, (4) remove shares, (5) add printers, (6) remove printers, (7) add user accounts, or (8) remove user accounts, as demonstrated by certain start, stop, and restart parameters to the status program. CVE-2011-2694 Cross-site scripting (XSS) vulnerability in the chg_passwd function in web/swat.c in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.10 allows remote authenticated administrators to inject arbitrary web script or HTML via the username parameter to the passwd program (aka the user field to the Change Password page). Solution: Update your system with the appropriate patches or software upgrades. CVSS Score: 6.8 CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2011-2522 BugTraq ID: 48899 http://www.securityfocus.com/bid/48899 Debian Security Information: DSA-2290 (Google Search) http://www.debian.org/security/2011/dsa-2290 http://www.exploit-db.com/exploits/17577 HPdes Security Advisory: HPSBNS02701 http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543 HPdes Security Advisory: HPSBUX02768 http://marc.info/?l=bugtraq&m=133527864025056&w=2 HPdes Security Advisory: SSRT100598 HPdes Security Advisory: SSRT100664 http://jvn.jp/en/jp/JVN29529126/index.html http://www.mandriva.com/security/advisories?name=MDVSA-2011:121 http://osvdb.org/74071 http://securitytracker.com/id?1025852 http://secunia.com/advisories/45393 http://secunia.com/advisories/45488 http://secunia.com/advisories/45496 http://securityreason.com/securityalert/8317 http://ubuntu.com/usn/usn-1182-1 XForce ISS Database: samba-swat-csrf(68843) https://exchange.xforce.ibmcloud.com/vulnerabilities/68843 Common Vulnerability Exposure (CVE) ID: CVE-2011-2694 BugTraq ID: 48901 http://www.securityfocus.com/bid/48901 http://jvn.jp/en/jp/JVN63041502/index.html http://osvdb.org/74072 XForce ISS Database: samba-user-xss(68844) https://exchange.xforce.ibmcloud.com/vulnerabilities/68844 |
Copyright | Copyright (C) 2011 E-Soft Inc. |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |