Multiple format string vulnerabilities in logging functions in mod_auth_pgsql before 2.0.3, when used for user authentication against a PostgreSQL database, allows remote unauthenticated attackers to execute arbitrary code, as demonstrated via the username.
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Mod_auth_pgsql | Guiseppe_tanzilli_and_matthias_eckermann | * | 2.0.3 (including) |
Mod_auth_pgsql | Guiseppe_tanzilli_and_matthias_eckermann | 0.9.5 (including) | 0.9.5 (including) |
Mod_auth_pgsql | Guiseppe_tanzilli_and_matthias_eckermann | 0.9.6 (including) | 0.9.6 (including) |
Red Hat Enterprise Linux 3 | RedHat | mod_auth_pgsql-0:2.0.1-4.ent.1 | * |
Red Hat Enterprise Linux 4 | RedHat | mod_auth_pgsql-0:2.0.1-7.1 | * |
Libapache2-mod-auth-pgsql | Ubuntu | dapper | * |
Libapache2-mod-auth-pgsql | Ubuntu | devel | * |
Libapache2-mod-auth-pgsql | Ubuntu | edgy | * |
Libapache2-mod-auth-pgsql | Ubuntu | feisty | * |