- --------------------------------------------------------------------------
Debian Security Advisory DSA 319-1                     security@debian.org 
Debian -- Security Information                              Matt Zimmerman
June 12th, 2003                          Debian -- Debian security FAQ 
- --------------------------------------------------------------------------

Package        : webmin
Vulnerability  : session ID spoofing
Problem-Type   : remote
Debian-specific: no
CVE Id         : CAN-2003-0101

miniserv.pl in the webmin package does not properly handle
metacharacters, such as line feeds and carriage returns, in
Base64-encoded strings used in Basic authentication.  This
vulnerability allows remote attackers to spoof a session ID, and
thereby gain root privileges.

For the stable distribution (woody) this problem has been fixed in
version 0.94-7woody1.

The old stable distribution (potato) does not contain a webmin package.

For the unstable distribution (sid) this problem is fixed in version
1.070-1.

We recommend that you update your webmin package.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

      
      Size/MD5 checksum:     1126 68e911f1b0ca669eb8ba250e3c8e9188
      
      Size/MD5 checksum:    62990 1b96c1d52b1e3315861df4b9b788840e
      
      Size/MD5 checksum:  4831737 114c7ca2557c17faebb627a3de7acb97

  Architecture independent components:

      
      Size/MD5 checksum:   223628 1cce74d57c8893994e9e751732e3d03e
      
      Size/MD5 checksum:   181942 e811fad93db9508eff56bf43e02af243
      
      Size/MD5 checksum:    32474 61a7860de06b4c220bc5a073e0228c2f
      
      Size/MD5 checksum:    27498 fb58c07651016767072aa185582e1262
      
      Size/MD5 checksum:    30588 db6836541741fcf9dfd4c11e0c8c5c86
      
      Size/MD5 checksum:  1250010 c41276d145a5bea9e3a684a07892101c
      
      Size/MD5 checksum:    26400 0627034bae9b0128afe4c12680a9825c
      
      Size/MD5 checksum:    96410 19dcc297592c48c4c35bbc59e6e3559b
      
      Size/MD5 checksum:    54614 dc151a7489baa9b03797412a4157b860
      
      Size/MD5 checksum:    27162 90953255ab14012fd81134938f417953
      
      Size/MD5 checksum:    21574 b5beb6b9e40c95da6e34797d7a29250e
      
      Size/MD5 checksum:    47848 1d4fcb713365e15e08c95f26adb19bb9
      
      Size/MD5 checksum:    31260 b5de1505b1e0fc0f1764fa0e836353db
      
      Size/MD5 checksum:   103586 d9175bbe682efe11d4209a3d90cdab1b
      
      Size/MD5 checksum:    62302 ec02f075f96ab2bcf0fcabb890f4bf59
      
      Size/MD5 checksum:   119004 6afc4480515fb840dc7a7732a7d70b23
      
      Size/MD5 checksum:    62448 fd5fc92c3c0d9259feba4a4869c518f6
      
      Size/MD5 checksum:   196532 eff08cb3653eae193616237978423763
      
      Size/MD5 checksum:    77372 11b4fe1d73410f1e43530508c128c604
      
      Size/MD5 checksum:    20636 6f115702e3fa9b3d622b92d371e56b2c
      
      Size/MD5 checksum:    37828 f28eefac5b5da0c7d3752aaf7440ff9c
      
      Size/MD5 checksum:    87808 0b0f39e10987f90879f6367393940ef7
      
      Size/MD5 checksum:    35618 5f3fb91dcb493ae563720a6e2d7a1626
      
      Size/MD5 checksum:   134034 4b86de5f297b3662a3efd389510bd248
      
      Size/MD5 checksum:   235074 ffb041417449df36ae7085c9344eb332
      
      Size/MD5 checksum:    89148 64d9b960a740a5be9fab9eb79fb188fd
      
      Size/MD5 checksum:   221836 7035074b9a76335e6103a30485e3134c
      
      Size/MD5 checksum:    44078 4733ff267ebfc94ba0e6e6481873249d
      
      Size/MD5 checksum:     8320 42484bc80e887649fb701adea4cf0c73
      
      Size/MD5 checksum:    42774 8f62321c6243e85c61790b290efcc59b
      
      Size/MD5 checksum:    26600 ce3679dc5bd620e803c881e15410bc09
      
      Size/MD5 checksum:   110828 9fd579f5d5980ddae4768a0459835a99
      
      Size/MD5 checksum:    31774 98f1456602b807a1a84bfcf6075ce9df
      
      Size/MD5 checksum:   509038 75fb02b81e729cc0361ebf11d59ef59c

  Intel IA-32 architecture:

      
      Size/MD5 checksum:    29336 ab60b8d46f362e853f0b0417beb44655

These files will probably be moved into the stable distribution on its
next revision.

- ---------------------------------------------------------------------------------
For apt-get: deb  Debian -- Security Information  stable/updates main
For dpkg-ftp:    dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and  http://packages.debian.org/

Debian: webmin session ID spoofing vulnerability

June 16, 2003
miniserv.pl in the webmin package does not properly handle metacharacters, such as line feeds and carriage returns, in Base64-encoded strings used in Basic authentication.

Summary

miniserv.pl in the webmin package does not properly handle
metacharacters, such as line feeds and carriage returns, in
Base64-encoded strings used in Basic authentication. This
vulnerability allows remote attackers to spoof a session ID, and
thereby gain root privileges.

For the stable distribution (woody) this problem has been fixed in
version 0.94-7woody1.

The old stable distribution (potato) does not contain a webmin package.

For the unstable distribution (sid) this problem is fixed in version
1.070-1.

We recommend that you update your webmin package.

Upgrade Instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody

Source archives:


Size/MD5 checksum: 1126 68e911f1b0ca669eb8ba250e3c8e9188

Size/MD5 checksum: 62990 1b96c1d52b1e3315861df4b9b788840e

Size/MD5 checksum: 4831737 114c7ca2557c17faebb627a3de7acb97

Architecture independent components:


Size/MD5 checksum: 223628 1cce74d57c8893994e9e751732e3d03e

Size/MD5 checksum: 181942 e811fad93db9508eff56bf43e02af243

Size/MD5 checksum: 32474 61a7860de06b4c220bc5a073e0228c2f

Size/MD5 checksum: 27498 fb58c07651016767072aa185582e1262

Size/MD5 checksum: 30588 db6836541741fcf9dfd4c11e0c8c5c86

Size/MD5 checksum: 1250010 c41276d145a5bea9e3a684a07892101c

Size/MD5 checksum: 26400 0627034bae9b0128afe4c12680a9825c

Size/MD5 checksum: 96410 19dcc297592c48c4c35bbc59e6e3559b

Size/MD5 checksum: 54614 dc151a7489baa9b03797412a4157b860

Size/MD5 checksum: 27162 90953255ab14012fd81134938f417953

Size/MD5 checksum: 21574 b5beb6b9e40c95da6e34797d7a29250e

Size/MD5 checksum: 47848 1d4fcb713365e15e08c95f26adb19bb9

Size/MD5 checksum: 31260 b5de1505b1e0fc0f1764fa0e836353db

Size/MD5 checksum: 103586 d9175bbe682efe11d4209a3d90cdab1b

Size/MD5 checksum: 62302 ec02f075f96ab2bcf0fcabb890f4bf59

Size/MD5 checksum: 119004 6afc4480515fb840dc7a7732a7d70b23

Size/MD5 checksum: 62448 fd5fc92c3c0d9259feba4a4869c518f6

Size/MD5 checksum: 196532 eff08cb3653eae193616237978423763

Size/MD5 checksum: 77372 11b4fe1d73410f1e43530508c128c604

Size/MD5 checksum: 20636 6f115702e3fa9b3d622b92d371e56b2c

Size/MD5 checksum: 37828 f28eefac5b5da0c7d3752aaf7440ff9c

Size/MD5 checksum: 87808 0b0f39e10987f90879f6367393940ef7

Size/MD5 checksum: 35618 5f3fb91dcb493ae563720a6e2d7a1626

Size/MD5 checksum: 134034 4b86de5f297b3662a3efd389510bd248

Size/MD5 checksum: 235074 ffb041417449df36ae7085c9344eb332

Size/MD5 checksum: 89148 64d9b960a740a5be9fab9eb79fb188fd

Size/MD5 checksum: 221836 7035074b9a76335e6103a30485e3134c

Size/MD5 checksum: 44078 4733ff267ebfc94ba0e6e6481873249d

Size/MD5 checksum: 8320 42484bc80e887649fb701adea4cf0c73

Size/MD5 checksum: 42774 8f62321c6243e85c61790b290efcc59b

Size/MD5 checksum: 26600 ce3679dc5bd620e803c881e15410bc09

Size/MD5 checksum: 110828 9fd579f5d5980ddae4768a0459835a99

Size/MD5 checksum: 31774 98f1456602b807a1a84bfcf6075ce9df

Size/MD5 checksum: 509038 75fb02b81e729cc0361ebf11d59ef59c

Intel IA-32 architecture:


Size/MD5 checksum: 29336 ab60b8d46f362e853f0b0417beb44655

These files will probably be moved into the stable distribution on its
next revision.

For apt-get: deb Debian -- Security Information stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and http://packages.debian.org/



Severity
Package : webmin
Vulnerability : session ID spoofing
Problem-Type : remote
Debian-specific: no
CVE Id : CAN-2003-0101

Related News