- --------------------------------------------------------------------------
Debian Security Advisory DSA 319-1 security@debian.org
Debian -- Security Information Matt Zimmerman
June 12th, 2003 Debian -- Debian security FAQ
- --------------------------------------------------------------------------
Package : webmin
Vulnerability : session ID spoofing
Problem-Type : remote
Debian-specific: no
CVE Id : CAN-2003-0101
miniserv.pl in the webmin package does not properly handle
metacharacters, such as line feeds and carriage returns, in
Base64-encoded strings used in Basic authentication. This
vulnerability allows remote attackers to spoof a session ID, and
thereby gain root privileges.
For the stable distribution (woody) this problem has been fixed in
version 0.94-7woody1.
The old stable distribution (potato) does not contain a webmin package.
For the unstable distribution (sid) this problem is fixed in version
1.070-1.
We recommend that you update your webmin package.
Upgrade Instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
- --------------------------------
Source archives:
Size/MD5 checksum: 1126 68e911f1b0ca669eb8ba250e3c8e9188
Size/MD5 checksum: 62990 1b96c1d52b1e3315861df4b9b788840e
Size/MD5 checksum: 4831737 114c7ca2557c17faebb627a3de7acb97
Architecture independent components:
Size/MD5 checksum: 223628 1cce74d57c8893994e9e751732e3d03e
Size/MD5 checksum: 181942 e811fad93db9508eff56bf43e02af243
Size/MD5 checksum: 32474 61a7860de06b4c220bc5a073e0228c2f
Size/MD5 checksum: 27498 fb58c07651016767072aa185582e1262
Size/MD5 checksum: 30588 db6836541741fcf9dfd4c11e0c8c5c86
Size/MD5 checksum: 1250010 c41276d145a5bea9e3a684a07892101c
Size/MD5 checksum: 26400 0627034bae9b0128afe4c12680a9825c
Size/MD5 checksum: 96410 19dcc297592c48c4c35bbc59e6e3559b
Size/MD5 checksum: 54614 dc151a7489baa9b03797412a4157b860
Size/MD5 checksum: 27162 90953255ab14012fd81134938f417953
Size/MD5 checksum: 21574 b5beb6b9e40c95da6e34797d7a29250e
Size/MD5 checksum: 47848 1d4fcb713365e15e08c95f26adb19bb9
Size/MD5 checksum: 31260 b5de1505b1e0fc0f1764fa0e836353db
Size/MD5 checksum: 103586 d9175bbe682efe11d4209a3d90cdab1b
Size/MD5 checksum: 62302 ec02f075f96ab2bcf0fcabb890f4bf59
Size/MD5 checksum: 119004 6afc4480515fb840dc7a7732a7d70b23
Size/MD5 checksum: 62448 fd5fc92c3c0d9259feba4a4869c518f6
Size/MD5 checksum: 196532 eff08cb3653eae193616237978423763
Size/MD5 checksum: 77372 11b4fe1d73410f1e43530508c128c604
Size/MD5 checksum: 20636 6f115702e3fa9b3d622b92d371e56b2c
Size/MD5 checksum: 37828 f28eefac5b5da0c7d3752aaf7440ff9c
Size/MD5 checksum: 87808 0b0f39e10987f90879f6367393940ef7
Size/MD5 checksum: 35618 5f3fb91dcb493ae563720a6e2d7a1626
Size/MD5 checksum: 134034 4b86de5f297b3662a3efd389510bd248
Size/MD5 checksum: 235074 ffb041417449df36ae7085c9344eb332
Size/MD5 checksum: 89148 64d9b960a740a5be9fab9eb79fb188fd
Size/MD5 checksum: 221836 7035074b9a76335e6103a30485e3134c
Size/MD5 checksum: 44078 4733ff267ebfc94ba0e6e6481873249d
Size/MD5 checksum: 8320 42484bc80e887649fb701adea4cf0c73
Size/MD5 checksum: 42774 8f62321c6243e85c61790b290efcc59b
Size/MD5 checksum: 26600 ce3679dc5bd620e803c881e15410bc09
Size/MD5 checksum: 110828 9fd579f5d5980ddae4768a0459835a99
Size/MD5 checksum: 31774 98f1456602b807a1a84bfcf6075ce9df
Size/MD5 checksum: 509038 75fb02b81e729cc0361ebf11d59ef59c
Intel IA-32 architecture:
Size/MD5 checksum: 29336 ab60b8d46f362e853f0b0417beb44655
These files will probably be moved into the stable distribution on its
next revision.
- ---------------------------------------------------------------------------------
For apt-get: deb Debian -- Security Information stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and http://packages.debian.org/