CVE-2004-0583
CVSS5.0
发布时间 :2004-08-06 00:00:00
修订时间 :2016-10-17 22:46:22
NMCOPS    

[原文]The account lockout functionality in (1) Webmin 1.140 and (2) Usermin 1.070 does not parse certain character strings, which allows remote attackers to conduct a brute force attack to guess user IDs and passwords.


[CNNVD]Webmin多个未明安全漏洞(CNNVD-200408-061)

        
        Webmin是基于WEB接口的Linux/Unix系统管理工具,使用任何支持表单的浏览器可以设置用户帐户、APACHE、DNS、文件共享等。
        Webmin存在多个未明安全问题,远程攻击者可以利用这两个漏洞获得敏感信息或对应用程序进行拒绝服务攻击。
        第一个问题可使用户利用任意模块而不需要高权限用户权力获得敏感信息,第二个问题允许攻击者发送伪造的验证信息使应用程序锁住Webmin的用户功能。目前没有详细漏洞细节提供。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/o:debian:debian_linux:3.0::ia-32
cpe:/o:debian:debian_linux:3.0::ppc
cpe:/o:debian:debian_linux:3.0::arm
cpe:/o:debian:debian_linux:3.0::mipsel
cpe:/o:debian:debian_linux:3.0::hppa
cpe:/o:debian:debian_linux:3.0::ia-64
cpe:/o:debian:debian_linux:3.0::mips
cpe:/o:debian:debian_linux:3.0::alpha
cpe:/o:debian:debian_linux:3.0::m68k
cpe:/o:debian:debian_linux:3.0::sparc
cpe:/a:usermin:usermin:1.070
cpe:/o:debian:debian_linux:3.0Debian Debian Linux 3.0
cpe:/o:debian:debian_linux:3.0::s-390
cpe:/a:webmin:webmin:1.1.40

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0583
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0583
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200408-061
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=108737059313829&w=2
(UNKNOWN)  BUGTRAQ  20040611 [SNS Advisory No.75] Webmin/Usermin Account Lockout Bypass Vulnerability
http://www.debian.org/security/2004/dsa-526
(UNKNOWN)  DEBIAN  DSA-526
http://www.gentoo.org/security/en/glsa/glsa-200406-12.xml
(UNKNOWN)  GENTOO  GLSA-200406-12
http://www.gentoo.org/security/en/glsa/glsa-200406-15.xml
(UNKNOWN)  GENTOO  GLSA-200406-15
http://www.lac.co.jp/security/csl/intelligence/SNSadvisory_e/75_e.html
(UNKNOWN)  MISC  http://www.lac.co.jp/security/csl/intelligence/SNSadvisory_e/75_e.html
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:074
(UNKNOWN)  MANDRAKE  MDKSA-2004:074
http://www.securityfocus.com/bid/10474
(VENDOR_ADVISORY)  BID  10474
http://www.securityfocus.com/bid/10523
(VENDOR_ADVISORY)  BID  10523
http://www.webmin.com/changes-1.150.html
(UNKNOWN)  CONFIRM  http://www.webmin.com/changes-1.150.html
http://xforce.iss.net/xforce/xfdb/16334
(VENDOR_ADVISORY)  XF  webmin-username-password-dos(16334)

- 漏洞信息

Webmin多个未明安全漏洞
中危 输入验证
2004-08-06 00:00:00 2005-10-20 00:00:00
远程  
        
        Webmin是基于WEB接口的Linux/Unix系统管理工具,使用任何支持表单的浏览器可以设置用户帐户、APACHE、DNS、文件共享等。
        Webmin存在多个未明安全问题,远程攻击者可以利用这两个漏洞获得敏感信息或对应用程序进行拒绝服务攻击。
        第一个问题可使用户利用任意模块而不需要高权限用户权力获得敏感信息,第二个问题允许攻击者发送伪造的验证信息使应用程序锁住Webmin的用户功能。目前没有详细漏洞细节提供。
        

- 公告与补丁

        厂商补丁:
        Webmin
        ------
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        Webmin Upgrade webmin-1.150.tar.gz
        
        http://prdownloads.sourceforge.net/webadmin/webmin-1.150.tar.gz

- 漏洞信息 (F33713)

dsa526.txt (PacketStormID:F33713)
2004-07-03 00:00:00
Matt Zimmerman  debian.org
advisory,remote,vulnerability
linux,debian
CVE-2004-0582,CVE-2004-0583
[点击下载]

Debian Security Advisory DSA 526-1 - Two vulnerabilities in Webmin 1.140 allow remote attackers to bypass access control rules and the ability to brute force IDs and passwords.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 526-1                     security@debian.org
http://www.debian.org/security/                             Matt Zimmerman
July 3rd, 2004                          http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : webmin
Vulnerability  : several
Problem-Type   : remote
Debian-specific: no
CVE Ids        : CAN-2004-0582 CAN-2004-0583

Two vulnerabilities were discovered in webmin:

CAN-2004-0582: Unknown vulnerability in Webmin 1.140 allows remote
 attackers to bypass access control rules and gain read access to
 configuration information for a module.

CAN-2004-0583: The account lockout functionality in (1) Webmin 1.140
 and (2) Usermin 1.070 does not parse certain character strings, which
 allows remote attackers to conduct a brute force attack to guess user
 IDs and passwords.

For the current stable distribution (woody), these problems have been
fixed in version 0.94-7woody2.

For the unstable distribution (sid), these problems have been fixed in
version 1.150-1.

We recommend that you update your webmin package.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/w/webmin/webmin_0.94-7woody2.dsc
      Size/MD5 checksum:     1126 995ac5b48cbc4baf168d89aea22e3258
    http://security.debian.org/pool/updates/main/w/webmin/webmin_0.94-7woody2.diff.gz
      Size/MD5 checksum:    63417 8c70be8b163bf819c8e6fca95b898654
    http://security.debian.org/pool/updates/main/w/webmin/webmin_0.94.orig.tar.gz
      Size/MD5 checksum:  4831737 114c7ca2557c17faebb627a3de7acb97

  Architecture independent components:

    http://security.debian.org/pool/updates/main/w/webmin/webmin-apache_0.94-7woody2_all.deb
      Size/MD5 checksum:   223884 22de96c300bc414b2f2982d077190a7c
    http://security.debian.org/pool/updates/main/w/webmin/webmin-bind8_0.94-7woody2_all.deb
      Size/MD5 checksum:   181060 2ca3ebb2b494877720b400e9a8a19130
    http://security.debian.org/pool/updates/main/w/webmin/webmin-burner_0.94-7woody2_all.deb
      Size/MD5 checksum:    32944 00283db28697c6104869afd8599bd691
    http://security.debian.org/pool/updates/main/w/webmin/webmin-cluster-software_0.94-7woody2_all.deb
      Size/MD5 checksum:    28296 968a289d95e6c665df672a3e151425cb
    http://security.debian.org/pool/updates/main/w/webmin/webmin-cluster-useradmin_0.94-7woody2_all.deb
      Size/MD5 checksum:    32568 61e0a5f74bc0bbc41caeaabc0fb5de99
    http://security.debian.org/pool/updates/main/w/webmin/webmin-core_0.94-7woody2_all.deb
      Size/MD5 checksum:  1258080 ca65a0dd02df1f6d52884114c0373cf4
    http://security.debian.org/pool/updates/main/w/webmin/webmin-cpan_0.94-7woody2_all.deb
      Size/MD5 checksum:    27010 ca3b05a95193cf97c6348b1f44ae03b6
    http://security.debian.org/pool/updates/main/w/webmin/webmin-dhcpd_0.94-7woody2_all.deb
      Size/MD5 checksum:    97166 229fc6f7eedbef4663ed1587d4b1a724
    http://security.debian.org/pool/updates/main/w/webmin/webmin-exports_0.94-7woody2_all.deb
      Size/MD5 checksum:    55360 f62c16dd09bae16329470911174c45b9
    http://security.debian.org/pool/updates/main/w/webmin/webmin-fetchmail_0.94-7woody2_all.deb
      Size/MD5 checksum:    27938 1bf4b912a833fbb8fd709f3319d2fa82
    http://security.debian.org/pool/updates/main/w/webmin/webmin-heartbeat_0.94-7woody2_all.deb
      Size/MD5 checksum:    21688 f6a85cf21843bea1f9856f559dca2469
    http://security.debian.org/pool/updates/main/w/webmin/webmin-inetd_0.94-7woody2_all.deb
      Size/MD5 checksum:    46456 297501fccf6eeee31a6b02b9fbc3a3ec
    http://security.debian.org/pool/updates/main/w/webmin/webmin-jabber_0.94-7woody2_all.deb
      Size/MD5 checksum:    32094 6870567dff48f54dc846216223da8e3a
    http://security.debian.org/pool/updates/main/w/webmin/webmin-lpadmin_0.94-7woody2_all.deb
      Size/MD5 checksum:   103388 2c95c4cf6ae9fc4b320c43aac48fa1bb
    http://security.debian.org/pool/updates/main/w/webmin/webmin-mon_0.94-7woody2_all.deb
      Size/MD5 checksum:    63490 fd37e7a07dabe8cb016a3037aba75796
    http://security.debian.org/pool/updates/main/w/webmin/webmin-mysql_0.94-7woody2_all.deb
      Size/MD5 checksum:   121704 220d406600a9f355df3a916a1627a7cc
    http://security.debian.org/pool/updates/main/w/webmin/webmin-nis_0.94-7woody2_all.deb
      Size/MD5 checksum:    67036 90a3b2bf04d954c11156194a788ce1cc
    http://security.debian.org/pool/updates/main/w/webmin/webmin-postfix_0.94-7woody2_all.deb
      Size/MD5 checksum:   209084 68a0cf048a8a585a7c63abca9d31fbc4
    http://security.debian.org/pool/updates/main/w/webmin/webmin-postgresql_0.94-7woody2_all.deb
      Size/MD5 checksum:    78792 347840e8305a3c16f053e9bcf4389594
    http://security.debian.org/pool/updates/main/w/webmin/webmin-ppp_0.94-7woody2_all.deb
      Size/MD5 checksum:    21026 fd312485daa6d1b97db57f960cb6d2f8
    http://security.debian.org/pool/updates/main/w/webmin/webmin-qmailadmin_0.94-7woody2_all.deb
      Size/MD5 checksum:    39820 a98ed9cf6633f0d844e5dcdf07330237
    http://security.debian.org/pool/updates/main/w/webmin/webmin-quota_0.94-7woody2_all.deb
      Size/MD5 checksum:    89304 c756d2c966ad30165fdba6aa9956af4c
    http://security.debian.org/pool/updates/main/w/webmin/webmin-raid_0.94-7woody2_all.deb
      Size/MD5 checksum:    36384 adea65391d94ab7e4902f120a134a9d7
    http://security.debian.org/pool/updates/main/w/webmin/webmin-samba_0.94-7woody2_all.deb
      Size/MD5 checksum:   133746 db13e84d7c2613248daff848a3b826bc
    http://security.debian.org/pool/updates/main/w/webmin/webmin-sendmail_0.94-7woody2_all.deb
      Size/MD5 checksum:   240714 3d6ddce61af213c76b53843b59d4ac8f
    http://security.debian.org/pool/updates/main/w/webmin/webmin-software_0.94-7woody2_all.deb
      Size/MD5 checksum:    91650 db9819b53497d70653e0c6eac5f748b6
    http://security.debian.org/pool/updates/main/w/webmin/webmin-squid_0.94-7woody2_all.deb
      Size/MD5 checksum:   223974 adbeb70d3fd39f2aaa10b8d642f8f0db
    http://security.debian.org/pool/updates/main/w/webmin/webmin-sshd_0.94-7woody2_all.deb
      Size/MD5 checksum:    43666 78f683b147d29340e0ae87c2919afa98
    http://security.debian.org/pool/updates/main/w/webmin/webmin-ssl_0.94-7woody2_all.deb
      Size/MD5 checksum:     8406 f7237e77cc5d19b5c4048b4fc05300eb
    http://security.debian.org/pool/updates/main/w/webmin/webmin-status_0.94-7woody2_all.deb
      Size/MD5 checksum:    43452 606bf0ab3115e71e59345393492d0dd8
    http://security.debian.org/pool/updates/main/w/webmin/webmin-stunnel_0.94-7woody2_all.deb
      Size/MD5 checksum:    26750 92533f3c91f2b285729a1b5299f3ee46
    http://security.debian.org/pool/updates/main/w/webmin/webmin-wuftpd_0.94-7woody2_all.deb
      Size/MD5 checksum:   113522 2d60c4a473e533014c5750d3e3a7366f
    http://security.debian.org/pool/updates/main/w/webmin/webmin-xinetd_0.94-7woody2_all.deb
      Size/MD5 checksum:    32648 12d6edfc27ef9087c344cd24093e947d
    http://security.debian.org/pool/updates/main/w/webmin/webmin_0.94-7woody2_all.deb
      Size/MD5 checksum:   514162 f4b38b85faa032ffe0715929df40551c

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/w/webmin/webmin-grub_0.94-7woody2_i386.deb
      Size/MD5 checksum:    29432 615495ff454f129d404a720f6ede5993

  These files will probably be moved into the stable distribution on
  its next revision.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFA5wFEArxCt0PiXR4RAp+IAKCeSwJ5s3kQZ7cd7JrcBMESAWLLfgCeJ4UB
h5320rigCxubCKFZn/CsAa4=
=fcGw
-----END PGP SIGNATURE-----
    

- 漏洞信息

6729
Webmin Arbitrary Account Lock DoS
Remote / Network Access Authentication Management, Denial of Service
Loss of Availability Upgrade
Exploit Public Vendor Verified

- 漏洞描述

Webmin contains a flaw that may allow a remote denial of service. The issue is triggered when a malicious user attempts logon with bogus usernames or passwords, and may result in loss of availability for arbitrary Webmin users.

- 时间线

2004-06-03 Unknow
2004-06-03 Unknow

- 解决方案

Upgrade to version 1.150 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

Webmin And Usermin Account Lockout Bypass Vulnerability
Input Validation Error 10523
Yes No
2004-06-11 12:00:00 2009-07-12 05:16:00
Discovery of this issue is credited to Keigo Yamazaki.

- 受影响的程序版本

Webmin Webmin 1.140
Webmin Webmin 1.0 70
+ HP Apache-Based Web Server 1.3.27 .01
+ HP Apache-Based Web Server 1.3.27 .01
+ HP Webmin-Based Admin 1.0.1 .01
+ HP Webmin-Based Admin 1.0.1 .01
+ Turbolinux Turbolinux Server 8.0
+ Turbolinux Turbolinux Server 8.0
+ Turbolinux Turbolinux Server 7.0
+ Turbolinux Turbolinux Server 7.0
+ Turbolinux Turbolinux Workstation 8.0
Usermin Usermin 1.0 70
Debian Linux 3.0 sparc
Debian Linux 3.0 s/390
Debian Linux 3.0 ppc
Debian Linux 3.0 mipsel
Debian Linux 3.0 mips
Debian Linux 3.0 m68k
Debian Linux 3.0 ia-64
Debian Linux 3.0 ia-32
Debian Linux 3.0 hppa
Debian Linux 3.0 arm
Debian Linux 3.0 alpha
Debian Linux 3.0
Webmin Webmin 1.150
Usermin Usermin 1.0 80

- 不受影响的程序版本

Webmin Webmin 1.150
Usermin Usermin 1.0 80

- 漏洞讨论

Webmin and Usermin are affected by an account lockout bypass vulnerability. This issue is due to a failure of the application to properly sanitize user-supplied input.

This issue may be leveraged to carry out brute force authentication attacks against the affected computer; facilitating unauthorized access to the Webmin and Usermin accounts as well as the affected computer. It has been reported that this issue can also be leveraged to prevent users from logging in, although how this occurs is unspecified.

- 漏洞利用

No exploit is required to leverage this issue.

- 解决方案

The vendor has released upgrades dealing with this issue.

Debian GNU/Linux has released advisory DSA 526-1 addressing this issue. Please see the referenced advisory for further information.

Mandrake Linux has released advisory MDKSA-2004:074 addressing this issue. Please see the referenced advisory for further information.

Turbolinux has released advisory 20050207 [TURBOLINUX SECURITY INFO] 07/Feb/2005 to address various issues. Please see the referenced advisory for more information.


Webmin Webmin 1.0 70

Usermin Usermin 1.0 70

Webmin Webmin 1.140

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站