Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2005-3042

Опубликовано: 22 сент. 2005
Источник: debian
EPSS Низкий

Описание

miniserv.pl in Webmin before 1.230 and Usermin before 1.160, when "full PAM conversations" is enabled, allows remote attackers to bypass authentication by spoofing session IDs via certain metacharacters (line feed or carriage return).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
webminfixed1.230-1package
webminnot-affectedsargepackage
userminfixed1.160-1package

Примечания

  • SNS Advisory 83, http://marc.info:80/?m=112733083203821

EPSS

Процентиль: 84%
0.02204
Низкий

Связанные уязвимости

ubuntu
около 20 лет назад

miniserv.pl in Webmin before 1.230 and Usermin before 1.160, when "full PAM conversations" is enabled, allows remote attackers to bypass authentication by spoofing session IDs via certain metacharacters (line feed or carriage return).

nvd
около 20 лет назад

miniserv.pl in Webmin before 1.230 and Usermin before 1.160, when "full PAM conversations" is enabled, allows remote attackers to bypass authentication by spoofing session IDs via certain metacharacters (line feed or carriage return).

github
больше 3 лет назад

miniserv.pl in Webmin before 1.230 and Usermin before 1.160, when "full PAM conversations" is enabled, allows remote attackers to bypass authentication by spoofing session IDs via certain metacharacters (line feed or carriage return).

EPSS

Процентиль: 84%
0.02204
Низкий