Vulnerability Details : CVE-2005-3042
miniserv.pl in Webmin before 1.230 and Usermin before 1.160, when "full PAM conversations" is enabled, allows remote attackers to bypass authentication by spoofing session IDs via certain metacharacters (line feed or carriage return).
Products affected by CVE-2005-3042
- cpe:2.3:a:webmin:webmin:1.2.20:*:*:*:*:*:*:*
- cpe:2.3:a:usermin:usermin:1.150:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2005-3042
1.27%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 85 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2005-3042
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2005-3042
-
http://www.mandriva.com/security/advisories?name=MDKSA-2005:176
-
http://securityreason.com/securityalert/17
-
http://www.webmin.com/changes-1.230.html
Patch
-
http://www.securityfocus.com/bid/14889
-
http://www.novell.com/linux/security/advisories/2005_24_sr.html
404 Page Not Found | SUSE
-
http://www.gentoo.org/security/en/glsa/glsa-200509-17.xml
-
http://archives.neohapsis.com/archives/bugtraq/2005-09/0257.html
Patch;Vendor Advisory
-
http://www.webmin.com/uchanges-1.160.html
-
http://www.lac.co.jp/business/sns/intelligence/SNSadvisory_e/83_e.html
Patch;Vendor Advisory
-
http://www.vupen.com/english/advisories/2005/1791
-
http://jvn.jp/jp/JVN%2340940493/index.html
Jump to