CVE-2005-3042

miniserv.pl in Webmin before 1.230 and Usermin before 1.160, when "full PAM conversations" is enabled, allows remote attackers to bypass authentication by spoofing session IDs via certain metacharacters (line feed or carriage return).
References
Link Resource
http://archives.neohapsis.com/archives/bugtraq/2005-09/0257.html Patch Vendor Advisory
http://jvn.jp/jp/JVN%2340940493/index.html
http://secunia.com/advisories/16858 Patch Vendor Advisory
http://secunia.com/advisories/17282
http://securityreason.com/securityalert/17
http://www.gentoo.org/security/en/glsa/glsa-200509-17.xml
http://www.lac.co.jp/business/sns/intelligence/SNSadvisory_e/83_e.html Patch Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2005:176
http://www.novell.com/linux/security/advisories/2005_24_sr.html
http://www.osvdb.org/19575
http://www.securityfocus.com/bid/14889
http://www.vupen.com/english/advisories/2005/1791
http://www.webmin.com/changes-1.230.html Patch
http://www.webmin.com/uchanges-1.160.html
http://archives.neohapsis.com/archives/bugtraq/2005-09/0257.html Patch Vendor Advisory
http://jvn.jp/jp/JVN%2340940493/index.html
http://secunia.com/advisories/16858 Patch Vendor Advisory
http://secunia.com/advisories/17282
http://securityreason.com/securityalert/17
http://www.gentoo.org/security/en/glsa/glsa-200509-17.xml
http://www.lac.co.jp/business/sns/intelligence/SNSadvisory_e/83_e.html Patch Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2005:176
http://www.novell.com/linux/security/advisories/2005_24_sr.html
http://www.osvdb.org/19575
http://www.securityfocus.com/bid/14889
http://www.vupen.com/english/advisories/2005/1791
http://www.webmin.com/changes-1.230.html Patch
http://www.webmin.com/uchanges-1.160.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:usermin:usermin:1.150:*:*:*:*:*:*:*
cpe:2.3:a:webmin:webmin:1.2.20:*:*:*:*:*:*:*

History

21 Nov 2024, 00:00

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/bugtraq/2005-09/0257.html - Patch, Vendor Advisory () http://archives.neohapsis.com/archives/bugtraq/2005-09/0257.html - Patch, Vendor Advisory
References () http://jvn.jp/jp/JVN%2340940493/index.html - () http://jvn.jp/jp/JVN%2340940493/index.html -
References () http://secunia.com/advisories/16858 - Patch, Vendor Advisory () http://secunia.com/advisories/16858 - Patch, Vendor Advisory
References () http://secunia.com/advisories/17282 - () http://secunia.com/advisories/17282 -
References () http://securityreason.com/securityalert/17 - () http://securityreason.com/securityalert/17 -
References () http://www.gentoo.org/security/en/glsa/glsa-200509-17.xml - () http://www.gentoo.org/security/en/glsa/glsa-200509-17.xml -
References () http://www.lac.co.jp/business/sns/intelligence/SNSadvisory_e/83_e.html - Patch, Vendor Advisory () http://www.lac.co.jp/business/sns/intelligence/SNSadvisory_e/83_e.html - Patch, Vendor Advisory
References () http://www.mandriva.com/security/advisories?name=MDKSA-2005:176 - () http://www.mandriva.com/security/advisories?name=MDKSA-2005:176 -
References () http://www.novell.com/linux/security/advisories/2005_24_sr.html - () http://www.novell.com/linux/security/advisories/2005_24_sr.html -
References () http://www.osvdb.org/19575 - () http://www.osvdb.org/19575 -
References () http://www.securityfocus.com/bid/14889 - () http://www.securityfocus.com/bid/14889 -
References () http://www.vupen.com/english/advisories/2005/1791 - () http://www.vupen.com/english/advisories/2005/1791 -
References () http://www.webmin.com/changes-1.230.html - Patch () http://www.webmin.com/changes-1.230.html - Patch
References () http://www.webmin.com/uchanges-1.160.html - () http://www.webmin.com/uchanges-1.160.html -

Information

Published : 2005-09-22 10:03

Updated : 2024-11-21 00:00


NVD link : CVE-2005-3042

Mitre link : CVE-2005-3042

CVE.ORG link : CVE-2005-3042


JSON object : View

Products Affected

usermin

  • usermin

webmin

  • webmin