Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title New webmin packages fix input validation problems
Informations
Name DSA-1199 First vendor Publication 2006-10-23
Vendor Debian Last vendor Modification 2006-10-23
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Several vulnerabilities have been identified in webmin, a web-based administration toolkit.

CVE-2005-3912 A format string vulnerability in miniserv.pl could allow an attacker to cause a denial of service by crashing the application or exhausting system resources, and could potentially allow arbitrary code execution.

CVE-2006-3392 Improper input sanitization in miniserv.pl could allow an attacker to read arbitrary files on the webmin host by providing a specially crafted URL path to the miniserv http server.

CVE-2006-4542 Improper handling of null characters in URLs in miniserv.pl could allow an attacker to conduct cross-site scripting attacks, read CGI program source code, list local directories, and potentially execute arbirary code.

For the stable distribution (sarge), these problems have been fixed in version 1.180-3sarge1

Webmin is not included in unstable (sid) or testing (etch), so these problems are not present.

We recommend that you upgrade your webmin (1.180-3sarge1) package.

Original Source

Url : http://www.debian.org/security/2006/dsa-1199

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 33
Application 98
Os 1

OpenVAS Exploits

Date Description
2008-09-24 Name : Gentoo Security Advisory GLSA 200512-02 (webmin usermin)
File : nvt/glsa_200512_02.nasl
2008-09-24 Name : Gentoo Security Advisory GLSA 200608-11 (webmin/usermin)
File : nvt/glsa_200608_11.nasl
2008-09-04 Name : FreeBSD Ports: perl
File : nvt/freebsd_perl1.nasl
2008-09-04 Name : FreeBSD Ports: webmin
File : nvt/freebsd_webmin0.nasl
2008-01-17 Name : Debian Security Advisory DSA 1199-1 (webmin)
File : nvt/deb_1199_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
28338 Webmin/Usermin NULL Character Unspecified XSS

Webmin/Usermin contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not sanitize input passed in a NULL character. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
28337 Webmin/Usermin NULL Character Unspecified Source Disclosure

Webmin/Usermin contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered because input passed in a NULL character is not properly verified, this will disclose the source code of arbitrary CGI and Perl programs resulting in a loss of confidentiality.
26772 Webmin/Usermin simplify_path() Failure Arbitrary File Disclosure

Webmin / Usermin contain a flaw that may lead to an unauthorized information disclosure. The issue is triggered when an unspecified error occurs during URL handling by simplify_path() function, which will disclose files content information resulting in a loss of confidentiality.
21222 Webmin/Usermin miniserv.pl Format String Remote Code Execution

Nessus® Vulnerability Scanner

Date Description
2014-09-16 Name : The remote web server is affected by an information disclosure vulnerability.
File : usermin_1226_info_disclosure.nasl - Type : ACT_ATTACK
2014-09-16 Name : The remote web server is affected by an information disclosure flaw.
File : usermin_1220_info_disclosure.nasl - Type : ACT_ATTACK
2007-02-18 Name : The remote Mandrake Linux host is missing a security update.
File : mandrake_MDKSA-2006-170.nasl - Type : ACT_GATHER_INFO
2006-12-16 Name : The remote Mandrake Linux host is missing a security update.
File : mandrake_MDKSA-2006-125.nasl - Type : ACT_GATHER_INFO
2006-10-25 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1199.nasl - Type : ACT_GATHER_INFO
2006-09-02 Name : The remote web server is affected by an information disclosure vulnerability.
File : webmin_1296.nasl - Type : ACT_ATTACK
2006-08-07 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200608-11.nasl - Type : ACT_GATHER_INFO
2006-07-03 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_227475c209cb11db9156000e0c2e438a.nasl - Type : ACT_GATHER_INFO
2006-06-30 Name : The remote web server is affected by an information disclosure flaw.
File : webmin_1290.nasl - Type : ACT_ATTACK
2006-05-13 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_bb33981a7ac611dabf7200123f589060.nasl - Type : ACT_GATHER_INFO
2006-01-15 Name : The remote Mandrake Linux host is missing a security update.
File : mandrake_MDKSA-2005-223.nasl - Type : ACT_GATHER_INFO
2005-12-26 Name : The remote web server is affected by a format string vulnerability.
File : webmin_miniserv_username_format_string.nasl - Type : ACT_DENIAL
2005-12-15 Name : The remote Fedora Core host is missing a security update.
File : fedora_2005-1145.nasl - Type : ACT_GATHER_INFO
2005-12-15 Name : The remote Fedora Core host is missing a security update.
File : fedora_2005-1144.nasl - Type : ACT_GATHER_INFO
2005-12-08 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200512-02.nasl - Type : ACT_GATHER_INFO
2005-12-07 Name : The remote Fedora Core host is missing a security update.
File : fedora_2005-1116.nasl - Type : ACT_GATHER_INFO
2005-12-07 Name : The remote Fedora Core host is missing a security update.
File : fedora_2005-1113.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:26:17
  • Multiple Updates