Lucene search

K
gentooGentoo FoundationGLSA-200406-15
HistoryJun 18, 2004 - 12:00 a.m.

Usermin: Multiple vulnerabilities

2004-06-1800:00:00
Gentoo Foundation
security.gentoo.org
13

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.011 Low

EPSS

Percentile

84.1%

Background

Usermin is a web-based administration tool for Unix. It supports a wide range of user applications including configuring mail forwarding, setting up SSH or reading mail.

Description

Usermin contains two security vulnerabilities. One fails to properly sanitize email messages that contain malicious HTML or script code and the other could allow an attacker to lock out a valid user by sending an invalid username and password.

Impact

By sending a specially crafted e-mail, an attacker can execute arbitrary scripts running in the context of the victim’s browser. This can be lead to cookie theft and potentially to compromise of user accounts. Furthermore, an attacker could lock out legitimate users by sending invalid login information.

Workaround

There is no known workaround at this time. All users are encouraged to upgrade to the latest available version.

Resolution

Usermin users should upgrade to the latest version:

 # emerge sync
 
 # emerge -pv ">=app-admin/usermin-1.080"
 # emerge ">=app-admin/usermin-1.080"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-admin/usermin<= 1.070-r1UNKNOWN

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.011 Low

EPSS

Percentile

84.1%