______________________________________________________________________ Mandrake Linux Security Update Advisory ______________________________________________________________________ Package name: webmin Advisory ID: MDKSA-2003:025 Date: February 26th, 2003 Affected versions: 7.2, 8.0, 8.1, 8.2, 9.0, Single Network Firewall 7.2 ______________________________________________________________________ Problem Description: A vulnerability was discovered in webmin by Cintia M. Imanishi, in the miniserv.pl program, which is the core server of webmin. This vulnerability allows an attacker to spoof a session ID by including special metacharacters in the BASE64 encoding string used during the authentication process. This could allow an attacker to gain full administrative access to webmin. MandrakeSoft encourages all users to upgrade immediately. ______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0101 http://marc.theaimsgroup.com/?l=webmin-announce&m=104587858408101&w=2 ______________________________________________________________________ Updated Packages: Linux-Mandrake 7.2: 0ee3a9b29088dab06b211f8137ead0f4 7.2/RPMS/webmin-0.970-2.1mdk.noarch.rpm 70c12cf5f873867e48097867ba4d7511 7.2/SRPMS/webmin-0.970-2.1mdk.src.rpm Mandrake Linux 8.0: 1942eff82c6e3d6307f1ed3effcd8445 8.0/RPMS/webmin-0.970-2.2mdk.noarch.rpm fd6e16fb437508d292a08f1b8e3f4395 8.0/SRPMS/webmin-0.970-2.2mdk.src.rpm Mandrake Linux 8.0/PPC: ac36fd178467656f52737465aa7064c0 ppc/8.0/RPMS/webmin-0.970-2.2mdk.noarch.rpm fd6e16fb437508d292a08f1b8e3f4395 ppc/8.0/SRPMS/webmin-0.970-2.2mdk.src.rpm Mandrake Linux 8.1: c54d6a04c43babd622352dc154c11cf1 8.1/RPMS/webmin-0.970-2.3mdk.noarch.rpm bd072335c255b99babe2820da0f40895 8.1/SRPMS/webmin-0.970-2.3mdk.src.rpm Mandrake Linux 8.1/IA64: 85e21a0044eadb0c4fcc7154490904d2 ia64/8.1/RPMS/webmin-0.970-2.3mdk.noarch.rpm bd072335c255b99babe2820da0f40895 ia64/8.1/SRPMS/webmin-0.970-2.3mdk.src.rpm Mandrake Linux 8.2: f539ce86d0abc4dc722ef80d1f44b041 8.2/RPMS/webmin-0.970-2.3mdk.noarch.rpm bd072335c255b99babe2820da0f40895 8.2/SRPMS/webmin-0.970-2.3mdk.src.rpm Mandrake Linux 8.2/PPC: a37bc31328fa2a6cad1160db622b8006 ppc/8.2/RPMS/webmin-0.970-2.3mdk.noarch.rpm bd072335c255b99babe2820da0f40895 ppc/8.2/SRPMS/webmin-0.970-2.3mdk.src.rpm Mandrake Linux 9.0: 78ef5e7e090ed425adafb1bcd044a6d3 9.0/RPMS/webmin-0.990-6.1mdk.noarch.rpm 4c1ec7e6fbca1226856a325ec0d35de3 9.0/SRPMS/webmin-0.990-6.1mdk.src.rpm Single Network Firewall 7.2: 0ee3a9b29088dab06b211f8137ead0f4 snf7.2/RPMS/webmin-0.970-2.1mdk.noarch.rpm 70c12cf5f873867e48097867ba4d7511 snf7.2/SRPMS/webmin-0.970-2.1mdk.src.rpm ______________________________________________________________________ Bug IDs fixed (see https://qa.mandrakesoft.com for more information): ______________________________________________________________________ To upgrade automatically, use MandrakeUpdate. The verification of md5 checksums and GPG signatures is performed automatically for you. If you want to upgrade manually, download the updated package from one of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm". A list of FTP mirrors can be obtained from: http://www.mandrakesecure.net/en/ftp.php Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig <filename> All packages are signed by MandrakeSoft for security. You can obtain the GPG public key of the Mandrake Linux Security Team from: https://www.mandrakesecure.net/RPM-GPG-KEYS Please be aware that sometimes it takes the mirrors a few hours to update. You can view other update advisories for Mandrake Linux at: http://www.mandrakesecure.net/en/advisories/ MandrakeSoft has several security-related mailing list services that anyone can subscribe to. Information on these lists can be obtained by visiting: http://www.mandrakesecure.net/en/mlist.php If you want to report vulnerabilities, please contact security_linux-mandrake.com Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team <security linux-mandrake.com> ______________________________________________________________________ Mandrake Linux Security Update Advisory ______________________________________________________________________ Package name: shadow-utils Advisory ID: MDKSA-2003:026 Date: February 26th, 2003 Affected versions: 8.1, 8.2, 9.0, Multi Network Firewall 8.2 ______________________________________________________________________ Problem Description: The shadow-utils package contains the tool useradd, which is used to create or update new user information. When useradd creates an account, it would create it with improper permissions; instead of having it owned by the group mail, it would be owned by the user's primary group. If this is a shared group (ie. "users"), then all members of the shared group would be able to obtain access to the mail spools of other members of the same group. A patch to useradd has been applied to correct this problem. ______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1509 ______________________________________________________________________ Updated Packages: Mandrake Linux 8.1: d93c4cb6a8a6335f36982242e655937c 8.1/RPMS/shadow-utils-20000902-2.1mdk.i586.rpm 55585fdbad9b036c4d75d041ba49959f 8.1/SRPMS/shadow-utils-20000902-2.1mdk.src.rpm Mandrake Linux 8.1/IA64: 68f2dcf5eabd26c28a280c1b6636d600 ia64/8.1/RPMS/shadow-utils-20000902-2.1mdk.ia64.rpm 55585fdbad9b036c4d75d041ba49959f ia64/8.1/SRPMS/shadow-utils-20000902-2.1mdk.src.rpm Mandrake Linux 8.2: 2efd1aecd7bc0bfab1a63fcbc771c807 8.2/RPMS/shadow-utils-20000902-5.1mdk.i586.rpm 173215e735d47ac3e47de40f7db929ba 8.2/SRPMS/shadow-utils-20000902-5.1mdk.src.rpm Mandrake Linux 8.2/PPC: 075fed13279baf3b2fbd6680da785a36 ppc/8.2/RPMS/shadow-utils-20000902-5.1mdk.ppc.rpm 173215e735d47ac3e47de40f7db929ba ppc/8.2/SRPMS/shadow-utils-20000902-5.1mdk.src.rpm Mandrake Linux 9.0: 4aec1f507ffde87dd10299f31cb20b84 9.0/RPMS/shadow-utils-20000902-8.1mdk.i586.rpm ea8bb79641b11a029eb7c989f8606ec8 9.0/SRPMS/shadow-utils-20000902-8.1mdk.src.rpm Multi Network Firewall 8.2: 2efd1aecd7bc0bfab1a63fcbc771c807 mnf8.2/RPMS/shadow-utils-20000902-5.1mdk.i586.rpm 173215e735d47ac3e47de40f7db929ba mnf8.2/SRPMS/shadow-utils-20000902-5.1mdk.src.rpm ______________________________________________________________________ Bug IDs fixed (see https://qa.mandrakesoft.com for more information): ______________________________________________________________________ To upgrade automatically, use MandrakeUpdate. The verification of md5 checksums and GPG signatures is performed automatically for you. If you want to upgrade manually, download the updated package from one of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm". A list of FTP mirrors can be obtained from: http://www.mandrakesecure.net/en/ftp.php Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig <filename> All packages are signed by MandrakeSoft for security. You can obtain the GPG public key of the Mandrake Linux Security Team from: https://www.mandrakesecure.net/RPM-GPG-KEYS Please be aware that sometimes it takes the mirrors a few hours to update. You can view other update advisories for Mandrake Linux at: http://www.mandrakesecure.net/en/advisories/ MandrakeSoft has several security-related mailing list services that anyone can subscribe to. Information on these lists can be obtained by visiting: http://www.mandrakesecure.net/en/mlist.php If you want to report vulnerabilities, please contact security_linux-mandrake.com Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team <security linux-mandrake.com>
Mandrake Linux Advisories: webmin, shadow-utils
By
Get the Free Newsletter!
Subscribe to Developer Insider for top news, trends, & analysis