Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Webmin: Information leak in Gentoo binary package
Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200502-12
(Webmin: Information leak in Gentoo binary package)
Tavis Ormandy of the Gentoo Linux Security Audit Team discovered
that the Webmin ebuild contains a design flaw. It imports the encrypted
local root password into the miniserv.users file before building binary
packages that include this file.
A remote attacker could retrieve Portage-built Webmin binary
packages and recover the encrypted root password from the build host.
Users who never built or shared a Webmin binary package are
unaffected by this.
Webmin users should delete any old shared Webmin binary package as
soon as possible. They should also consider their buildhost root
password potentially exposed and follow proper audit procedures.
If you plan to build binary packages, you should upgrade to the
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-admin/webmin-1.170-r3"
Network Security Threat Level: Medium
Networks Security ID:
Vulnerability Assessment Copyright: (C) 2005 Michel Arboi
|Dell PowerEdge R510 2x X5570 2.93GHz Quad Core 128GB 12x 300GB 15K SAS PERC H700
|DELL POWEREDGE R730XD SERVER 12 BAY TWO E5-2620V3 2.4GHZ 1024GB 4 X 500GB SATA H
No Discussions have been posted on this vulnerability.