10
CVSSv2

CVE-2005-3656

Published: 31/12/2005 Updated: 07/11/2023
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Multiple format string vulnerabilities in logging functions in mod_auth_pgsql prior to 2.0.3, when used for user authentication against a PostgreSQL database, allows remote unauthenticated malicious users to execute arbitrary code, as demonstrated via the username.

Vulnerable Product Search on Vulmon Subscribe to Product

guiseppe tanzilli and matthias eckermann mod auth pgsql 0.9.5

guiseppe tanzilli and matthias eckermann mod auth pgsql 0.9.6

guiseppe tanzilli and matthias eckermann mod auth pgsql

Vendor Advisories

Synopsis mod_auth_pgsql security update Type/Severity Security Advisory: Critical Topic Updated mod_auth_pgsql packages that fix format string security issues arenow available for Red Hat Enterprise Linux 3 and 4This update has been rated as having critical security impact by the RedHat Security Response T ...
Several format string vulnerabilities were discovered in the error logging handling By sending specially crafted user names, an unauthenticated remote attacker could exploit this to crash the Apache server or possibly even execute arbitrary code with the privileges of Apache (user ‘www-data’) ...
iDEFENSE reports that a format string vulnerability in mod_auth_pgsql, a library used to authenticate web users against a PostgreSQL database, could be used to execute arbitrary code with the privileges of the httpd user The old stable distribution (woody) does not contain libapache2-mod-auth-pgsql For the stable distribution (sarge) this problem ...