Format string vulnerability in the my_xlog function in lib.c for Oops! Proxy Server 1.5.23 and earlier, as called by the auth functions in the passwd_mysql and passwd_pgsql modules, may allow attackers to execute arbitrary code via a URL.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Oops_proxy_server | Igor_khasilev | 1.4.22 (including) | 1.4.22 (including) |
Oops_proxy_server | Igor_khasilev | 1.5.19 (including) | 1.5.19 (including) |
Oops_proxy_server | Igor_khasilev | 1.5.53 (including) | 1.5.53 (including) |
Oops | Ubuntu | dapper | * |
Oops | Ubuntu | devel | * |
Oops | Ubuntu | edgy | * |
Oops | Ubuntu | feisty | * |