Changeset 774
- Timestamp:
- Jul 2, 2013, 8:03:46 PM (12 years ago)
- Location:
- branches/samba-3.5.x
- Files:
-
- 8 edited
Legend:
- Unmodified
- Added
- Removed
-
branches/samba-3.5.x/WHATSNEW.txt
r773 r774 1 ============================== 2 Release Notes for Samba 3.5.21 3 January 30, 2013 4 ============================== 5 6 7 This is a security release in order to address 8 CVE-2013-0213 (Clickjacking issue in SWAT) and 9 CVE-2013-0214 (Potential XSRF in SWAT). 10 11 o CVE-2013-0213: 12 All current released versions of Samba are vulnerable to clickjacking in the 13 Samba Web Administration Tool (SWAT). When the SWAT pages are integrated into 14 a malicious web page via a frame or iframe and then overlaid by other content, 15 an attacker could trick an administrator to potentially change Samba settings. 16 17 In order to be vulnerable, SWAT must have been installed and enabled 18 either as a standalone server launched from inetd or xinetd, or as a 19 CGI plugin to Apache. If SWAT has not been installed or enabled (which 20 is the default install state for Samba) this advisory can be ignored. 21 22 o CVE-2013-0214: 23 All current released versions of Samba are vulnerable to a cross-site 24 request forgery in the Samba Web Administration Tool (SWAT). By guessing a 25 user's password and then tricking a user who is authenticated with SWAT into 26 clicking a manipulated URL on a different web page, it is possible to manipulate 27 SWAT. 28 29 In order to be vulnerable, the attacker needs to know the victim's password. 30 Additionally SWAT must have been installed and enabled either as a standalone 31 server launched from inetd or xinetd, or as a CGI plugin to Apache. If SWAT has 32 not been installed or enabled (which is the default install state for Samba) 33 this advisory can be ignored. 34 35 36 Changes since 3.5.20: 37 --------------------- 38 39 o Kai Blin <kai@samba.org> 40 * BUG 9576: CVE-2013-0213: Fix clickjacking issue in SWAT. 41 * BUG 9577: CVE-2013-0214: Fix potential XSRF in SWAT. 42 43 44 ###################################################################### 45 Reporting bugs & Development Discussion 46 ####################################### 47 48 Please discuss this release on the samba-technical mailing list or by 49 joining the #samba-technical IRC channel on irc.freenode.net. 50 51 If you do report problems then please try to send high quality 52 feedback. If you don't provide vital information to help us track down 53 the problem then you will probably be ignored. All bug reports should 54 be filed under the Samba 3.5 product in the project's Bugzilla 55 database (https://bugzilla.samba.org/). 56 57 58 ====================================================================== 59 == Our Code, Our Bugs, Our Responsibility. 60 == The Samba Team 61 ====================================================================== 62 63 64 Release notes for older releases follow: 65 ---------------------------------------- 66 1 67 ============================== 2 68 Release Notes for Samba 3.5.20 … … 52 118 53 119 54 Release notes for older releases follow: 55 ---------------------------------------- 120 ---------------------------------------------------------------------- 121 56 122 57 123 ============================== -
branches/samba-3.5.x/packaging/RHEL-CTDB/samba.spec
r773 r774 6 6 Packager: Samba Team <samba@samba.org> 7 7 Name: samba 8 Version: 3.5.2 08 Version: 3.5.21 9 9 Release: 1GITHASH 10 10 Epoch: 0 -
branches/samba-3.5.x/packaging/RHEL/makerpms.sh
r773 r774 21 21 USERID=`id -u` 22 22 GRPID=`id -g` 23 VERSION='3.5.2 0'23 VERSION='3.5.21' 24 24 REVISION='' 25 25 SPECFILE="samba.spec" -
branches/samba-3.5.x/packaging/RHEL/samba.spec
r773 r774 12 12 Packager: Samba Team <samba@samba.org> 13 13 Name: samba 14 Version: 3.5.2 014 Version: 3.5.21 15 15 Release: 1 16 16 Epoch: 0 -
branches/samba-3.5.x/source3/VERSION
r773 r774 26 26 SAMBA_VERSION_MAJOR=3 27 27 SAMBA_VERSION_MINOR=5 28 SAMBA_VERSION_RELEASE=2 028 SAMBA_VERSION_RELEASE=21 29 29 30 30 ######################################################## -
branches/samba-3.5.x/source3/web/cgi.c
r617 r774 46 46 static char *C_user; 47 47 static char *C_pass; 48 static char *C_nonce; 48 49 static bool inetd_server; 49 50 static bool got_request; … … 329 330 330 331 if (!setuid(0)) { 331 C_pass = secrets_fetch_generic("root", "SWAT"); 332 if (C_pass == NULL) { 333 char *tmp_pass = NULL; 334 tmp_pass = generate_random_str(talloc_tos(), 16); 335 if (tmp_pass == NULL) { 336 printf("%sFailed to create random nonce for " 337 "SWAT session\n<br>%s\n", head, tail); 338 exit(0); 339 } 340 secrets_store_generic("root", "SWAT", tmp_pass); 341 C_pass = SMB_STRDUP(tmp_pass); 342 TALLOC_FREE(tmp_pass); 343 } 332 C_pass = SMB_STRDUP(cgi_nonce()); 344 333 } 345 334 setuid(pwd->pw_uid); … … 453 442 return(C_pass); 454 443 } 444 445 /*************************************************************************** 446 return a ptr to the nonce 447 ***************************************************************************/ 448 char *cgi_nonce(void) 449 { 450 const char *head = "Content-Type: text/html\r\n\r\n<HTML><BODY><H1>SWAT installation Error</H1>\n"; 451 const char *tail = "</BODY></HTML>\r\n"; 452 C_nonce = secrets_fetch_generic("root", "SWAT"); 453 if (C_nonce == NULL) { 454 char *tmp_pass = NULL; 455 tmp_pass = generate_random_str(talloc_tos(), 16); 456 if (tmp_pass == NULL) { 457 printf("%sFailed to create random nonce for " 458 "SWAT session\n<br>%s\n", head, tail); 459 exit(0); 460 } 461 secrets_store_generic("root", "SWAT", tmp_pass); 462 C_nonce = SMB_STRDUP(tmp_pass); 463 TALLOC_FREE(tmp_pass); 464 } 465 return(C_nonce); 466 } 467 455 468 456 469 /*************************************************************************** -
branches/samba-3.5.x/source3/web/swat.c
r732 r774 149 149 uint8_t token[16]; 150 150 int i; 151 char *nonce = cgi_nonce(); 151 152 152 153 token_str[0] = '\0'; … … 162 163 MD5Update(&md5_ctx, (uint8_t *)pass, strlen(pass)); 163 164 } 165 MD5Update(&md5_ctx, (uint8_t *)nonce, strlen(nonce)); 164 166 165 167 MD5Final(token, &md5_ctx); … … 261 263 printf("Expires: 0\r\n"); 262 264 } 263 printf("Content-type: text/html\r\n\r\n"); 265 printf("Content-type: text/html\r\n"); 266 printf("X-Frame-Options: DENY\r\n\r\n"); 264 267 265 268 if (!include_html("include/header.html")) { -
branches/samba-3.5.x/source3/web/swat_proto.h
r617 r774 33 33 char *cgi_user_name(void); 34 34 char *cgi_user_pass(void); 35 char *cgi_nonce(void); 35 36 void cgi_setup(const char *rootdir, int auth_required); 36 37 const char *cgi_baseurl(void);
Note:
See TracChangeset
for help on using the changeset viewer.