Multiple format string vulnerabilities in the auth_ldap_log_reason function in Apache auth_ldap 1.6.0 and earlier allows remote attackers to execute arbitrary code via various vectors, including the username.
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Auth_ldap | Dave_carrigan | 1.2.1 (including) | 1.2.1 (including) |
Auth_ldap | Dave_carrigan | 1.2.2 (including) | 1.2.2 (including) |
Auth_ldap | Dave_carrigan | 1.2.3 (including) | 1.2.3 (including) |
Auth_ldap | Dave_carrigan | 1.2.4 (including) | 1.2.4 (including) |
Auth_ldap | Dave_carrigan | 1.3.0 (including) | 1.3.0 (including) |
Auth_ldap | Dave_carrigan | 1.3.1 (including) | 1.3.1 (including) |
Auth_ldap | Dave_carrigan | 1.3.2 (including) | 1.3.2 (including) |
Auth_ldap | Dave_carrigan | 1.3.3 (including) | 1.3.3 (including) |
Auth_ldap | Dave_carrigan | 1.3.4 (including) | 1.3.4 (including) |
Auth_ldap | Dave_carrigan | 1.4.0 (including) | 1.4.0 (including) |
Auth_ldap | Dave_carrigan | 1.4.2 (including) | 1.4.2 (including) |
Auth_ldap | Dave_carrigan | 1.4.3 (including) | 1.4.3 (including) |
Auth_ldap | Dave_carrigan | 1.6.0 (including) | 1.6.0 (including) |
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 | RedHat | * | |
Red Hat Enterprise Linux ES version 2.1 | RedHat | * | |
Red Hat Enterprise Linux WS version 2.1 | RedHat | * | |
Red Hat Linux Advanced Workstation 2.1 | RedHat | * |