First published: Tue Feb 15 2005(Updated: )
The ebuild of Webmin before 1.170-r3 on Gentoo Linux includes the encrypted root password in the miniserv.users file when building a tbz2 of the webmin package, which allows remote attackers to obtain and possibly crack the encrypted password.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Webmin | =1.160 | |
Webmin | =1.150 | |
Webmin | =1.140 | |
Webmin | =1.170-r2 | |
Webmin | =1.170-r1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0427 is classified as a medium severity vulnerability due to the exposure of the encrypted root password.
To fix CVE-2005-0427, update Webmin to a version that does not include the root password in the miniserv.users file.
CVE-2005-0427 affects Webmin versions 1.140, 1.150, 1.160, and 1.170-r1, and 1.170-r2 on Gentoo Linux.
The consequence of CVE-2005-0427 is that remote attackers can potentially obtain and crack the encrypted root password.
You can check if your system is vulnerable to CVE-2005-0427 by inspecting the miniserv.users file for an encrypted root password in Webmin versions mentioned.