Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2005-3042

Опубликовано: 22 сент. 2005
Источник: debian

Описание

miniserv.pl in Webmin before 1.230 and Usermin before 1.160, when "full PAM conversations" is enabled, allows remote attackers to bypass authentication by spoofing session IDs via certain metacharacters (line feed or carriage return).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
webminfixed1.230-1package
webminnot-affectedsargepackage
userminfixed1.160-1package

Примечания

  • SNS Advisory 83, http://marc.info:80/?m=112733083203821

Связанные уязвимости

ubuntu
больше 20 лет назад

miniserv.pl in Webmin before 1.230 and Usermin before 1.160, when "full PAM conversations" is enabled, allows remote attackers to bypass authentication by spoofing session IDs via certain metacharacters (line feed or carriage return).

nvd
больше 20 лет назад

miniserv.pl in Webmin before 1.230 and Usermin before 1.160, when "full PAM conversations" is enabled, allows remote attackers to bypass authentication by spoofing session IDs via certain metacharacters (line feed or carriage return).

github
почти 4 года назад

miniserv.pl in Webmin before 1.230 and Usermin before 1.160, when "full PAM conversations" is enabled, allows remote attackers to bypass authentication by spoofing session IDs via certain metacharacters (line feed or carriage return).