Lucene search

K

Gentoo Security Advisory GLSA 200502-12 (Webmin)

🗓️ 24 Sep 2008 00:00:00Reported by Copyright (C) 2008 E-Soft Inc.Type 
openvas
 openvas
🔗 plugins.openvas.org👁 14 Views

Gentoo Security Advisory GLSA 200502-12 (Webmin) includes accidental exposure of local encrypted root password in Portage-built Webmin binary packages. Users should delete old shared Webmin binary package and upgrade to version >= 1.170-r3

Show more
Related
Refs
Code
ReporterTitlePublishedViews
Family
CVE
CVE-2005-0427
2 May 200504:00
cve
Gentoo Linux
Webmin: Information leak in Gentoo binary package
11 Feb 200500:00
gentoo
Tenable Nessus
GLSA-200502-12 : Webmin: Information leak in Gentoo binary package
14 Feb 200500:00
nessus
OpenVAS
Gentoo Security Advisory GLSA 200502-12 (Webmin)
24 Sep 200800:00
openvas
UbuntuCve
CVE-2005-0427
2 May 200500:00
ubuntucve
NVD
CVE-2005-0427
2 May 200504:00
nvd
Cvelist
CVE-2005-0427
15 Feb 200505:00
cvelist
# SPDX-FileCopyrightText: 2008 E-Soft Inc.
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.54844");
  script_cve_id("CVE-2005-0427");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:N/A:N");
  script_version("2023-07-14T16:09:26+0000");
  script_tag(name:"last_modification", value:"2023-07-14 16:09:26 +0000 (Fri, 14 Jul 2023)");
  script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_name("Gentoo Security Advisory GLSA 200502-12 (Webmin)");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2008 E-Soft Inc.");
  script_family("Gentoo Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/gentoo", "ssh/login/pkg");
  script_tag(name:"insight", value:"Portage-built Webmin binary packages accidentally include a file containing
the local encrypted root password.");
  script_tag(name:"solution", value:"Webmin users should delete any old shared Webmin binary package as soon as
possible. They should also consider their buildhost root password
potentially exposed and follow proper audit procedures.

If you plan to build binary packages, you should upgrade to the latest
version:

    # emerge --sync
    # emerge --ask --oneshot --verbose '>=app-admin/webmin-1.170-r3'");

  script_xref(name:"URL", value:"http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200502-12");
  script_xref(name:"URL", value:"http://bugs.gentoo.org/show_bug.cgi?id=77731");
  script_tag(name:"summary", value:"The remote host is missing updates announced in
advisory GLSA 200502-12.");
  script_tag(name:"qod_type", value:"package");
  script_tag(name:"solution_type", value:"VendorFix");

  exit(0);
}

include("pkg-lib-gentoo.inc");
include("revisions-lib.inc");

res = "";
report = "";
report = "";
if ((res = ispkgvuln(pkg:"app-admin/webmin", unaffected: make_list("ge 1.170-r3"), vulnerable: make_list("lt 1.170-r3"))) != NULL) {
    report += res;
}

if (report != "") {
    security_message(data:report);
} else if (__pkg_match) {
    exit(99);
}

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
24 Sep 2008 00:00Current
7.2High risk
Vulners AI Score7.2
CVSS25
EPSS0.00363
14
.json
Report