7.5
CVSSv2

CVE-2006-0150

Published: 09/01/2006 Updated: 14/02/2024
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple format string vulnerabilities in the auth_ldap_log_reason function in Apache auth_ldap 1.6.0 and previous versions allows remote malicious users to execute arbitrary code via various vectors, including the username.

Vulnerable Product Search on Vulmon Subscribe to Product

dave carrigan auth ldap 1.4.2

dave carrigan auth ldap 1.6.0

dave carrigan auth ldap 1.3.3

dave carrigan auth ldap 1.3.0

dave carrigan auth ldap 1.3.2

dave carrigan auth ldap 1.2.3

dave carrigan auth ldap 1.3.1

dave carrigan auth ldap 1.4.3

dave carrigan auth ldap 1.3.4

dave carrigan auth ldap 1.2.2

dave carrigan auth ldap 1.4.0

dave carrigan auth ldap 1.2.4

dave carrigan auth ldap 1.2.1

Vendor Advisories

Synopsis auth_ldap security update Type/Severity Security Advisory: Critical Topic An updated auth_ldap packages that fixes a format string security issue isnow available for Red Hat Enterprise Linux 21This update has been rated as having critical security impact by the RedHat Security Response Team ...
"Seregorn" discovered a format string vulnerability in the logging function of libapache-auth-ldap, an LDAP authentication module for the Apache webserver, that can lead to the execution of arbitrary code For the old stable distribution (woody) this problem has been fixed in version 160-31 For the stable distribution (sarge) this problem has b ...