Gentoo Security Advisory GLSA 200502-12 (Webmin) includes accidental exposure of local encrypted root password in Portage-built Webmin binary packages. Users should delete old shared Webmin binary package and upgrade to version >= 1.170-r3
Reporter | Title | Published | Views | Family All 7 |
---|---|---|---|---|
![]() | CVE-2005-0427 | 2 May 200504:00 | – | cve |
![]() | Webmin: Information leak in Gentoo binary package | 11 Feb 200500:00 | – | gentoo |
![]() | GLSA-200502-12 : Webmin: Information leak in Gentoo binary package | 14 Feb 200500:00 | – | nessus |
![]() | Gentoo Security Advisory GLSA 200502-12 (Webmin) | 24 Sep 200800:00 | – | openvas |
![]() | CVE-2005-0427 | 2 May 200500:00 | – | ubuntucve |
![]() | CVE-2005-0427 | 2 May 200504:00 | – | nvd |
![]() | CVE-2005-0427 | 15 Feb 200505:00 | – | cvelist |
Source | Link |
---|---|
bugs | www.bugs.gentoo.org/show_bug.cgi |
securityspace | www.securityspace.com/smysecure/catid.html |
# SPDX-FileCopyrightText: 2008 E-Soft Inc.
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.54844");
script_cve_id("CVE-2005-0427");
script_tag(name:"cvss_base", value:"5.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:N/A:N");
script_version("2023-07-14T16:09:26+0000");
script_tag(name:"last_modification", value:"2023-07-14 16:09:26 +0000 (Fri, 14 Jul 2023)");
script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
script_name("Gentoo Security Advisory GLSA 200502-12 (Webmin)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2008 E-Soft Inc.");
script_family("Gentoo Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/gentoo", "ssh/login/pkg");
script_tag(name:"insight", value:"Portage-built Webmin binary packages accidentally include a file containing
the local encrypted root password.");
script_tag(name:"solution", value:"Webmin users should delete any old shared Webmin binary package as soon as
possible. They should also consider their buildhost root password
potentially exposed and follow proper audit procedures.
If you plan to build binary packages, you should upgrade to the latest
version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=app-admin/webmin-1.170-r3'");
script_xref(name:"URL", value:"http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200502-12");
script_xref(name:"URL", value:"http://bugs.gentoo.org/show_bug.cgi?id=77731");
script_tag(name:"summary", value:"The remote host is missing updates announced in
advisory GLSA 200502-12.");
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("pkg-lib-gentoo.inc");
include("revisions-lib.inc");
res = "";
report = "";
report = "";
if ((res = ispkgvuln(pkg:"app-admin/webmin", unaffected: make_list("ge 1.170-r3"), vulnerable: make_list("lt 1.170-r3"))) != NULL) {
report += res;
}
if (report != "") {
security_message(data:report);
} else if (__pkg_match) {
exit(99);
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo