From a24567fbc43f221b14e805f9bc0b7c6d16911c46 Mon Sep 17 00:00:00 2001 From: Alex Legler Date: Sun, 8 Mar 2015 22:02:38 +0100 Subject: Import existing advisories --- glsa-200601-05.xml | 70 ++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 70 insertions(+) create mode 100644 glsa-200601-05.xml (limited to 'glsa-200601-05.xml') diff --git a/glsa-200601-05.xml b/glsa-200601-05.xml new file mode 100644 index 00000000..9a40445d --- /dev/null +++ b/glsa-200601-05.xml @@ -0,0 +1,70 @@ + + + + + + + mod_auth_pgsql: Multiple format string vulnerabilities + + Format string vulnerabilities in mod_auth_pgsql may lead to the execution + of arbitrary code. + + mod_auth_pgsql + January 10, 2006 + December 30, 2007: 03 + 118096 + remote + + + 2.0.3 + 1.0.0 + 2.0.3 + + + +

+ mod_auth_pgsql is an Apache2 module that allows user authentication + against a PostgreSQL database. +

+
+ +

+ The error logging functions of mod_auth_pgsql fail to validate certain + strings before passing them to syslog, resulting in format string + vulnerabilities. +

+
+ +

+ An unauthenticated remote attacker could exploit these vulnerabilities + to execute arbitrary code with the rights of the user running the + Apache2 server by sending specially crafted login names. +

+
+ +

+ There is no known workaround at this time. +

+
+ +

+ All mod_auth_pgsql users should upgrade to the latest version: +

+ + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-apache/mod_auth_pgsql-2.0.3" +
+ + CVE-2005-3656 + FrSIRT ADV-2006-0070 + + + DerCorny + + + DerCorny + + + DerCorny + +
-- cgit v1.2.3-65-gdbad