summaryrefslogtreecommitdiff
blob: e7794f7f3c54ad3a227a34620ce112657647c9d0 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200509-17">
  <title>Webmin, Usermin: Remote code execution through PAM authentication</title>
  <synopsis>
    If Webmin or Usermin is configured to use full PAM conversations, it is
    vulnerable to the remote execution of arbitrary code with root privileges.
  </synopsis>
  <product type="ebuild">Webmin Usermin</product>
  <announced>2005-09-24</announced>
  <revised count="01">2005-09-24</revised>
  <bug>106705</bug>
  <access>remote</access>
  <affected>
    <package name="app-admin/webmin" auto="yes" arch="*">
      <unaffected range="ge">1.230</unaffected>
      <vulnerable range="lt">1.230</vulnerable>
    </package>
    <package name="app-admin/usermin" auto="yes" arch="*">
      <unaffected range="ge">1.160</unaffected>
      <vulnerable range="lt">1.160</vulnerable>
    </package>
  </affected>
  <background>
    <p>
    Webmin and Usermin are web-based system administration consoles.
    Webmin allows an administrator to easily configure servers and other
    features. Usermin allows users to configure their own accounts, execute
    commands, and read e-mails.
    </p>
  </background>
  <description>
    <p>
    Keigo Yamazaki discovered that the miniserv.pl webserver, used in
    both Webmin and Usermin, does not properly validate authentication
    credentials before sending them to the PAM (Pluggable Authentication
    Modules) authentication process. The default configuration shipped with
    Gentoo does not enable the "full PAM conversations" option and is
    therefore unaffected by this flaw.
    </p>
  </description>
  <impact type="high">
    <p>
    A remote attacker could bypass the authentication process and run
    any command as the root user on the target server.
    </p>
  </impact>
  <workaround>
    <p>
    Do not enable "full PAM conversations" in the Authentication
    options of Webmin and Usermin.
    </p>
  </workaround>
  <resolution>
    <p>
    All Webmin users should upgrade to the latest version:
    </p>
    <code>
    # emerge --sync
    # emerge --ask --oneshot --verbose "&gt;=app-admin/webmin-1.230"</code>
    <p>
    All Usermin users should upgrade to the latest version:
    </p>
    <code>
    # emerge --sync
    # emerge --ask --oneshot --verbose "&gt;=app-admin/usermin-1.160"</code>
  </resolution>
  <references>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3042">CAN-2005-3042</uri>
    <uri link="http://www.lac.co.jp/business/sns/intelligence/SNSadvisory_e/83_e.html">Original Advisory</uri>
  </references>
  <metadata tag="submitter" timestamp="2005-09-23T12:50:05Z">
    koon
  </metadata>
  <metadata tag="bugReady" timestamp="2005-09-23T12:50:25Z">
    koon
  </metadata>
</glsa>