CVE-2003-0101
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
03/03/2003
Last modified:
20/11/2024
Description
miniserv.pl in (1) Webmin before 1.070 and (2) Usermin before 1.000 does not properly handle metacharacters such as line feeds and carriage returns (CRLF) in Base-64 encoded strings during Basic authentication, which allows remote attackers to spoof a session ID and gain root privileges.
Impact
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:engardelinux:guardian_digital_webtool:1.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:usermin:usermin:0.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:usermin:usermin:0.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:usermin:usermin:0.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:usermin:usermin:0.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:usermin:usermin:0.8:*:*:*:*:*:*:* | ||
cpe:2.3:a:usermin:usermin:0.9:*:*:*:*:*:*:* | ||
cpe:2.3:a:usermin:usermin:0.91:*:*:*:*:*:*:* | ||
cpe:2.3:a:usermin:usermin:0.92:*:*:*:*:*:*:* | ||
cpe:2.3:a:usermin:usermin:0.93:*:*:*:*:*:*:* | ||
cpe:2.3:a:usermin:usermin:0.94:*:*:*:*:*:*:* | ||
cpe:2.3:a:usermin:usermin:0.95:*:*:*:*:*:*:* | ||
cpe:2.3:a:usermin:usermin:0.96:*:*:*:*:*:*:* | ||
cpe:2.3:a:usermin:usermin:0.97:*:*:*:*:*:*:* | ||
cpe:2.3:a:usermin:usermin:0.98:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- ftp://patches.sgi.com/support/free/security/advisories/20030602-01-I
- http://archives.neohapsis.com/archives/hp/2003-q1/0063.html
- http://archives.neohapsis.com/archives/linux/engarde/2003-q1/0008.html
- http://marc.info/?l=bugtraq&m=104610245624895&w=2
- http://marc.info/?l=bugtraq&m=104610300325629&w=2
- http://marc.info/?l=bugtraq&m=104610336226274&w=2
- http://marc.info/?l=webmin-announce&m=104587858408101&w=2
- http://secunia.com/advisories/8115
- http://secunia.com/advisories/8163
- http://www.ciac.org/ciac/bulletins/n-058.shtml
- http://www.debian.org/security/2003/dsa-319
- http://www.iss.net/security_center/static/11390.php
- http://www.lac.co.jp/security/english/snsadv_e/62_e.html
- http://www.linuxsecurity.com/advisories/gentoo_advisory-2886.html
- http://www.mandriva.com/security/advisories?name=MDKSA-2003%3A025
- http://www.securityfocus.com/bid/6915
- http://www.securitytracker.com/id?1006160=
- ftp://patches.sgi.com/support/free/security/advisories/20030602-01-I
- http://archives.neohapsis.com/archives/hp/2003-q1/0063.html
- http://archives.neohapsis.com/archives/linux/engarde/2003-q1/0008.html
- http://marc.info/?l=bugtraq&m=104610245624895&w=2
- http://marc.info/?l=bugtraq&m=104610300325629&w=2
- http://marc.info/?l=bugtraq&m=104610336226274&w=2
- http://marc.info/?l=webmin-announce&m=104587858408101&w=2
- http://secunia.com/advisories/8115
- http://secunia.com/advisories/8163
- http://www.ciac.org/ciac/bulletins/n-058.shtml
- http://www.debian.org/security/2003/dsa-319
- http://www.iss.net/security_center/static/11390.php
- http://www.lac.co.jp/security/english/snsadv_e/62_e.html
- http://www.linuxsecurity.com/advisories/gentoo_advisory-2886.html
- http://www.mandriva.com/security/advisories?name=MDKSA-2003%3A025
- http://www.securityfocus.com/bid/6915
- http://www.securitytracker.com/id?1006160=