summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorKarolin Seeger <kseeger@samba.org>2013-01-29 10:49:29 +0100
committerKarolin Seeger <kseeger@samba.org>2013-01-29 10:49:29 +0100
commit4f0de0faf15e2c157ad88800a11648c181d82b65 (patch)
tree72b717a9c4cd303a36641f1042a3bce588cc0bf1
parent71dbced7ea45a4e20209fd4208d63b99fb50705b (diff)
downloadsamba-4f0de0faf15e2c157ad88800a11648c181d82b65.tar.gz
WHATSNEW: Prepare release notes for Samba 3.5.21.
This is a Security Release in order to address CVE-2013-0213 (Clickjacking issue in SWAT) and CVE-2013-0214 (Potential XSRF in SWAT). Karolin
-rw-r--r--WHATSNEW.txt43
1 files changed, 34 insertions, 9 deletions
diff --git a/WHATSNEW.txt b/WHATSNEW.txt
index c96f46fa1e8..a7766a94036 100644
--- a/WHATSNEW.txt
+++ b/WHATSNEW.txt
@@ -1,19 +1,44 @@
==============================
Release Notes for Samba 3.5.21
- , 2013
+ January 30, 2013
==============================
-This is the latest stable release of Samba 3.5.
-
-Major enhancements in Samba 3.5.21 include:
-
-o
-
-Changes since 3.5.19:
+This is a security release in order to address
+CVE-2013-0213 (Clickjacking issue in SWAT) and
+CVE-2013-0214 (Potential XSRF in SWAT).
+
+o CVE-2013-0213:
+ All current released versions of Samba are vulnerable to clickjacking in the
+ Samba Web Administration Tool (SWAT). When the SWAT pages are integrated into
+ a malicious web page via a frame or iframe and then overlaid by other content,
+ an attacker could trick an administrator to potentially change Samba settings.
+
+ In order to be vulnerable, SWAT must have been installed and enabled
+ either as a standalone server launched from inetd or xinetd, or as a
+ CGI plugin to Apache. If SWAT has not been installed or enabled (which
+ is the default install state for Samba) this advisory can be ignored.
+
+o CVE-2013-0214:
+ All current released versions of Samba are vulnerable to a cross-site
+ request forgery in the Samba Web Administration Tool (SWAT). By guessing a
+ user's password and then tricking a user who is authenticated with SWAT into
+ clicking a manipulated URL on a different web page, it is possible to manipulate
+ SWAT.
+
+ In order to be vulnerable, the attacker needs to know the victim's password.
+ Additionally SWAT must have been installed and enabled either as a standalone
+ server launched from inetd or xinetd, or as a CGI plugin to Apache. If SWAT has
+ not been installed or enabled (which is the default install state for Samba)
+ this advisory can be ignored.
+
+
+Changes since 3.5.20:
---------------------
-o Jeremy Allison <jra@samba.org>
+o Kai Blin <kai@samba.org>
+ * BUG 9576: CVE-2013-0213: Fix clickjacking issue in SWAT.
+ * BUG 9577: CVE-2013-0214: Fix potential XSRF in SWAT.
######################################################################