miniserv.pl in Webmin before 1.230 and Usermin before 1.160, when "full PAM conversations" is enabled, allows remote attackers to bypass authentication by spoofing session IDs via certain metacharacters (line feed or carriage return).
Link | Tags |
---|---|
http://secunia.com/advisories/16858 | third party advisory patch vendor advisory |
http://secunia.com/advisories/17282 | third party advisory |
http://www.gentoo.org/security/en/glsa/glsa-200509-17.xml | vendor advisory |
http://www.osvdb.org/19575 | vdb entry |
http://securityreason.com/securityalert/17 | third party advisory |
http://www.securityfocus.com/bid/14889 | vdb entry |
http://www.vupen.com/english/advisories/2005/1791 | vdb entry |
http://www.lac.co.jp/business/sns/intelligence/SNSadvisory_e/83_e.html | patch vendor advisory |
http://www.mandriva.com/security/advisories?name=MDKSA-2005:176 | vendor advisory |
http://www.novell.com/linux/security/advisories/2005_24_sr.html | vendor advisory |
http://archives.neohapsis.com/archives/bugtraq/2005-09/0257.html | mailing list patch vendor advisory |
http://www.webmin.com/changes-1.230.html | patch |
http://jvn.jp/jp/JVN%2340940493/index.html | third party advisory |
http://www.webmin.com/uchanges-1.160.html |