Lucene search

K
openvasCopyright (C) 2008 E-Soft Inc.OPENVAS:136141256231054844
HistorySep 24, 2008 - 12:00 a.m.

Gentoo Security Advisory GLSA 200502-12 (Webmin)

2008-09-2400:00:00
Copyright (C) 2008 E-Soft Inc.
plugins.openvas.org
4

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

7.2 High

AI Score

Confidence

Low

0.004 Low

EPSS

Percentile

74.1%

The remote host is missing updates announced in
advisory GLSA 200502-12.

# SPDX-FileCopyrightText: 2008 E-Soft Inc.
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.54844");
  script_cve_id("CVE-2005-0427");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:N/A:N");
  script_version("2023-07-14T16:09:26+0000");
  script_tag(name:"last_modification", value:"2023-07-14 16:09:26 +0000 (Fri, 14 Jul 2023)");
  script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_name("Gentoo Security Advisory GLSA 200502-12 (Webmin)");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2008 E-Soft Inc.");
  script_family("Gentoo Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/gentoo", "ssh/login/pkg");
  script_tag(name:"insight", value:"Portage-built Webmin binary packages accidentally include a file containing
the local encrypted root password.");
  script_tag(name:"solution", value:"Webmin users should delete any old shared Webmin binary package as soon as
possible. They should also consider their buildhost root password
potentially exposed and follow proper audit procedures.

If you plan to build binary packages, you should upgrade to the latest
version:

    # emerge --sync
    # emerge --ask --oneshot --verbose '>=app-admin/webmin-1.170-r3'");

  script_xref(name:"URL", value:"http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200502-12");
  script_xref(name:"URL", value:"http://bugs.gentoo.org/show_bug.cgi?id=77731");
  script_tag(name:"summary", value:"The remote host is missing updates announced in
advisory GLSA 200502-12.");
  script_tag(name:"qod_type", value:"package");
  script_tag(name:"solution_type", value:"VendorFix");

  exit(0);
}

include("pkg-lib-gentoo.inc");
include("revisions-lib.inc");

res = "";
report = "";
report = "";
if ((res = ispkgvuln(pkg:"app-admin/webmin", unaffected: make_list("ge 1.170-r3"), vulnerable: make_list("lt 1.170-r3"))) != NULL) {
    report += res;
}

if (report != "") {
    security_message(data:report);
} else if (__pkg_match) {
    exit(99);
}

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

7.2 High

AI Score

Confidence

Low

0.004 Low

EPSS

Percentile

74.1%

Related for OPENVAS:136141256231054844