Debian: webmin session ID spoofing vulnerability

    Date16 Jun 2003
    Posted ByLinuxSecurity Advisories in the webmin package does not properly handle metacharacters, such as line feeds and carriage returns, in Base64-encoded strings used in Basic authentication.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 319-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Matt Zimmerman
    June 12th, 2003                
    - --------------------------------------------------------------------------
    Package        : webmin
    Vulnerability  : session ID spoofing
    Problem-Type   : remote
    Debian-specific: no
    CVE Id         : CAN-2003-0101 in the webmin package does not properly handle
    metacharacters, such as line feeds and carriage returns, in
    Base64-encoded strings used in Basic authentication.  This
    vulnerability allows remote attackers to spoof a session ID, and
    thereby gain root privileges.
    For the stable distribution (woody) this problem has been fixed in
    version 0.94-7woody1.
    The old stable distribution (potato) does not contain a webmin package.
    For the unstable distribution (sid) this problem is fixed in version
    We recommend that you update your webmin package.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.0 alias woody
    - --------------------------------
      Source archives:
          Size/MD5 checksum:     1126 68e911f1b0ca669eb8ba250e3c8e9188
          Size/MD5 checksum:    62990 1b96c1d52b1e3315861df4b9b788840e
          Size/MD5 checksum:  4831737 114c7ca2557c17faebb627a3de7acb97
      Architecture independent components:
          Size/MD5 checksum:   223628 1cce74d57c8893994e9e751732e3d03e
          Size/MD5 checksum:   181942 e811fad93db9508eff56bf43e02af243
          Size/MD5 checksum:    32474 61a7860de06b4c220bc5a073e0228c2f
          Size/MD5 checksum:    27498 fb58c07651016767072aa185582e1262
          Size/MD5 checksum:    30588 db6836541741fcf9dfd4c11e0c8c5c86
          Size/MD5 checksum:  1250010 c41276d145a5bea9e3a684a07892101c
          Size/MD5 checksum:    26400 0627034bae9b0128afe4c12680a9825c
          Size/MD5 checksum:    96410 19dcc297592c48c4c35bbc59e6e3559b
          Size/MD5 checksum:    54614 dc151a7489baa9b03797412a4157b860
          Size/MD5 checksum:    27162 90953255ab14012fd81134938f417953
          Size/MD5 checksum:    21574 b5beb6b9e40c95da6e34797d7a29250e
          Size/MD5 checksum:    47848 1d4fcb713365e15e08c95f26adb19bb9
          Size/MD5 checksum:    31260 b5de1505b1e0fc0f1764fa0e836353db
          Size/MD5 checksum:   103586 d9175bbe682efe11d4209a3d90cdab1b
          Size/MD5 checksum:    62302 ec02f075f96ab2bcf0fcabb890f4bf59
          Size/MD5 checksum:   119004 6afc4480515fb840dc7a7732a7d70b23
          Size/MD5 checksum:    62448 fd5fc92c3c0d9259feba4a4869c518f6
          Size/MD5 checksum:   196532 eff08cb3653eae193616237978423763
          Size/MD5 checksum:    77372 11b4fe1d73410f1e43530508c128c604
          Size/MD5 checksum:    20636 6f115702e3fa9b3d622b92d371e56b2c
          Size/MD5 checksum:    37828 f28eefac5b5da0c7d3752aaf7440ff9c
          Size/MD5 checksum:    87808 0b0f39e10987f90879f6367393940ef7
          Size/MD5 checksum:    35618 5f3fb91dcb493ae563720a6e2d7a1626
          Size/MD5 checksum:   134034 4b86de5f297b3662a3efd389510bd248
          Size/MD5 checksum:   235074 ffb041417449df36ae7085c9344eb332
          Size/MD5 checksum:    89148 64d9b960a740a5be9fab9eb79fb188fd
          Size/MD5 checksum:   221836 7035074b9a76335e6103a30485e3134c
          Size/MD5 checksum:    44078 4733ff267ebfc94ba0e6e6481873249d
          Size/MD5 checksum:     8320 42484bc80e887649fb701adea4cf0c73
          Size/MD5 checksum:    42774 8f62321c6243e85c61790b290efcc59b
          Size/MD5 checksum:    26600 ce3679dc5bd620e803c881e15410bc09
          Size/MD5 checksum:   110828 9fd579f5d5980ddae4768a0459835a99
          Size/MD5 checksum:    31774 98f1456602b807a1a84bfcf6075ce9df
          Size/MD5 checksum:   509038 75fb02b81e729cc0361ebf11d59ef59c
      Intel IA-32 architecture:
          Size/MD5 checksum:    29336 ab60b8d46f362e853f0b0417beb44655
    These files will probably be moved into the stable distribution on its
    next revision.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"64","type":"x","order":"1","pct":57.14,"resources":[]},{"id":"88","title":"Should be more technical","votes":"15","type":"x","order":"2","pct":13.39,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"33","type":"x","order":"3","pct":29.46,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.