Users login

Create an account »

JOIN XATRIX

Users login

Home » Hacking News » MDKSA-2003:025 - Updated webmin packages fix session ID spoofing vulnerability

MDKSA-2003:025 - Updated webmin packages fix session ID spoofing vulnerability

by Nikola Strahija on February 27th, 2003 This vulnerability allows an attacker to spoof a session ID by including special metacharacters in the BASE64 encoding string used during the authentication process.


Package name: webmin
Advisory ID: MDKSA-2003:025
Date: February 26th, 2003

Affected versions: 7.2, 8.0, 8.1, 8.2, 9.0,
Single Network Firewall 7.2
________________________________________________________________________

Problem Description:

A vulnerability was discovered in webmin by Cintia M. Imanishi, in the
miniserv.pl program, which is the core server of webmin. This
vulnerability allows an attacker to spoof a session ID by including
special metacharacters in the BASE64 encoding string used during the
authentication process. This could allow an attacker to gain full
administrative access to webmin.

MandrakeSoft encourages all users to upgrade immediately.
________________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0101
http://marc.theaimsgroup.com/?l=webmin-announce&m=104587858408101&w=2


Updated Packages:

Linux-Mandrake 7.2:
0ee3a9b29088dab06b211f8137ead0f4 7.2/RPMS/webmin-0.970-2.1mdk.noarch.rpm
70c12cf5f873867e48097867ba4d7511 7.2/SRPMS/webmin-0.970-2.1mdk.src.rpm

Mandrake Linux 8.0:
1942eff82c6e3d6307f1ed3effcd8445 8.0/RPMS/webmin-0.970-2.2mdk.noarch.rpm
fd6e16fb437508d292a08f1b8e3f4395 8.0/SRPMS/webmin-0.970-2.2mdk.src.rpm

Mandrake Linux 8.0/PPC:
ac36fd178467656f52737465aa7064c0 ppc/8.0/RPMS/webmin-0.970-2.2mdk.noarch.rpm
fd6e16fb437508d292a08f1b8e3f4395 ppc/8.0/SRPMS/webmin-0.970-2.2mdk.src.rpm

Mandrake Linux 8.1:
c54d6a04c43babd622352dc154c11cf1 8.1/RPMS/webmin-0.970-2.3mdk.noarch.rpm
bd072335c255b99babe2820da0f40895 8.1/SRPMS/webmin-0.970-2.3mdk.src.rpm

Mandrake Linux 8.1/IA64:
85e21a0044eadb0c4fcc7154490904d2 ia64/8.1/RPMS/webmin-0.970-2.3mdk.noarch.rpm
bd072335c255b99babe2820da0f40895 ia64/8.1/SRPMS/webmin-0.970-2.3mdk.src.rpm

Mandrake Linux 8.2:
f539ce86d0abc4dc722ef80d1f44b041 8.2/RPMS/webmin-0.970-2.3mdk.noarch.rpm
bd072335c255b99babe2820da0f40895 8.2/SRPMS/webmin-0.970-2.3mdk.src.rpm

Mandrake Linux 8.2/PPC:
a37bc31328fa2a6cad1160db622b8006 ppc/8.2/RPMS/webmin-0.970-2.3mdk.noarch.rpm
bd072335c255b99babe2820da0f40895 ppc/8.2/SRPMS/webmin-0.970-2.3mdk.src.rpm

Mandrake Linux 9.0:
78ef5e7e090ed425adafb1bcd044a6d3 9.0/RPMS/webmin-0.990-6.1mdk.noarch.rpm
4c1ec7e6fbca1226856a325ec0d35de3 9.0/SRPMS/webmin-0.990-6.1mdk.src.rpm

Single Network Firewall 7.2:
0ee3a9b29088dab06b211f8137ead0f4 snf7.2/RPMS/webmin-0.970-2.1mdk.noarch.rpm
70c12cf5f873867e48097867ba4d7511 snf7.2/SRPMS/webmin-0.970-2.1mdk.src.rpm
________________________________________________________________________

Bug IDs fixed (see https://qa.mandrakesoft.com for more information):
________________________________________________________________________

To upgrade automatically, use MandrakeUpdate. The verification of md5
checksums and GPG signatures is performed automatically for you.

If you want to upgrade manually, download the updated package from one
of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm". A list of
FTP mirrors can be obtained from:

http://www.mandrakesecure.net/en/ftp.php

Please verify the update prior to upgrading to ensure the integrity of
the downloaded package. You can do this with the command:

rpm --checksig

All packages are signed by MandrakeSoft for security. You can obtain
the GPG public key of the Mandrake Linux Security Team from:

https://www.mandrakesecure.net/RPM-GPG-KEYS

Please be aware that sometimes it takes the mirrors a few hours to
update.

You can view other update advisories for Mandrake Linux at:

http://www.mandrakesecure.net/en/advisories/

MandrakeSoft has several security-related mailing list services that
anyone can subscribe to. Information on these lists can be obtained by
visiting:

http://www.mandrakesecure.net/en/mlist.php

If you want to report vulnerabilities, please contact

security_linux-mandrake.com


Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »