- -------------------------------------------------------------------------- Debian Security Advisory DSA 319-1 security@debian.org Debian -- Security Information Matt Zimmerman June 12th, 2003 Debian -- Debian security FAQ - -------------------------------------------------------------------------- Package : webmin Vulnerability : session ID spoofing Problem-Type : remote Debian-specific: no CVE Id : CAN-2003-0101 miniserv.pl in the webmin package does not properly handle metacharacters, such as line feeds and carriage returns, in Base64-encoded strings used in Basic authentication. This vulnerability allows remote attackers to spoof a session ID, and thereby gain root privileges. For the stable distribution (woody) this problem has been fixed in version 0.94-7woody1. The old stable distribution (potato) does not contain a webmin package. For the unstable distribution (sid) this problem is fixed in version 1.070-1. We recommend that you update your webmin package. Upgrade Instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.0 alias woody - -------------------------------- Source archives: Size/MD5 checksum: 1126 68e911f1b0ca669eb8ba250e3c8e9188 Size/MD5 checksum: 62990 1b96c1d52b1e3315861df4b9b788840e Size/MD5 checksum: 4831737 114c7ca2557c17faebb627a3de7acb97 Architecture independent components: Size/MD5 checksum: 223628 1cce74d57c8893994e9e751732e3d03e Size/MD5 checksum: 181942 e811fad93db9508eff56bf43e02af243 Size/MD5 checksum: 32474 61a7860de06b4c220bc5a073e0228c2f Size/MD5 checksum: 27498 fb58c07651016767072aa185582e1262 Size/MD5 checksum: 30588 db6836541741fcf9dfd4c11e0c8c5c86 Size/MD5 checksum: 1250010 c41276d145a5bea9e3a684a07892101c Size/MD5 checksum: 26400 0627034bae9b0128afe4c12680a9825c Size/MD5 checksum: 96410 19dcc297592c48c4c35bbc59e6e3559b Size/MD5 checksum: 54614 dc151a7489baa9b03797412a4157b860 Size/MD5 checksum: 27162 90953255ab14012fd81134938f417953 Size/MD5 checksum: 21574 b5beb6b9e40c95da6e34797d7a29250e Size/MD5 checksum: 47848 1d4fcb713365e15e08c95f26adb19bb9 Size/MD5 checksum: 31260 b5de1505b1e0fc0f1764fa0e836353db Size/MD5 checksum: 103586 d9175bbe682efe11d4209a3d90cdab1b Size/MD5 checksum: 62302 ec02f075f96ab2bcf0fcabb890f4bf59 Size/MD5 checksum: 119004 6afc4480515fb840dc7a7732a7d70b23 Size/MD5 checksum: 62448 fd5fc92c3c0d9259feba4a4869c518f6 Size/MD5 checksum: 196532 eff08cb3653eae193616237978423763 Size/MD5 checksum: 77372 11b4fe1d73410f1e43530508c128c604 Size/MD5 checksum: 20636 6f115702e3fa9b3d622b92d371e56b2c Size/MD5 checksum: 37828 f28eefac5b5da0c7d3752aaf7440ff9c Size/MD5 checksum: 87808 0b0f39e10987f90879f6367393940ef7 Size/MD5 checksum: 35618 5f3fb91dcb493ae563720a6e2d7a1626 Size/MD5 checksum: 134034 4b86de5f297b3662a3efd389510bd248 Size/MD5 checksum: 235074 ffb041417449df36ae7085c9344eb332 Size/MD5 checksum: 89148 64d9b960a740a5be9fab9eb79fb188fd Size/MD5 checksum: 221836 7035074b9a76335e6103a30485e3134c Size/MD5 checksum: 44078 4733ff267ebfc94ba0e6e6481873249d Size/MD5 checksum: 8320 42484bc80e887649fb701adea4cf0c73 Size/MD5 checksum: 42774 8f62321c6243e85c61790b290efcc59b Size/MD5 checksum: 26600 ce3679dc5bd620e803c881e15410bc09 Size/MD5 checksum: 110828 9fd579f5d5980ddae4768a0459835a99 Size/MD5 checksum: 31774 98f1456602b807a1a84bfcf6075ce9df Size/MD5 checksum: 509038 75fb02b81e729cc0361ebf11d59ef59c Intel IA-32 architecture: Size/MD5 checksum: 29336 ab60b8d46f362e853f0b0417beb44655 These files will probably be moved into the stable distribution on its next revision. - --------------------------------------------------------------------------------- For apt-get: deb Debian -- Security Information stable/updates main For dpkg-ftp: dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show' and http://packages.debian.org/