CVE-2005-3656

Multiple format string vulnerabilities in logging functions in mod_auth_pgsql before 2.0.3, when used for user authentication against a PostgreSQL database, allows remote unauthenticated attackers to execute arbitrary code, as demonstrated via the username.
References
Link Resource
ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U Patch
http://secunia.com/advisories/18304 Patch Vendor Advisory
http://secunia.com/advisories/18321 Patch Vendor Advisory
http://secunia.com/advisories/18347 Patch Vendor Advisory
http://secunia.com/advisories/18348 Patch Vendor Advisory
http://secunia.com/advisories/18350 Patch Vendor Advisory
http://secunia.com/advisories/18397 Patch Vendor Advisory
http://secunia.com/advisories/18403 Patch Vendor Advisory
http://secunia.com/advisories/18463 Patch Vendor Advisory
http://secunia.com/advisories/18517 Patch Vendor Advisory
http://securitytracker.com/id?1015446 Patch
http://www.debian.de/security/2006/dsa-935 Patch Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200601-05.xml Patch Vendor Advisory
http://www.giuseppetanzilli.it/mod_auth_pgsql2/
http://www.idefense.com/intelligence/vulnerabilities/display.php?id=367 Patch Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2006:009
http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00015.html Patch
http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00016.html Patch
http://www.redhat.com/support/errata/RHSA-2006-0164.html Patch
http://www.securityfocus.com/bid/16153 Patch
http://www.trustix.org/errata/2006/0002/ Patch
http://www.vupen.com/english/advisories/2006/0070
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10600
https://usn.ubuntu.com/239-1/
ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U Patch
http://secunia.com/advisories/18304 Patch Vendor Advisory
http://secunia.com/advisories/18321 Patch Vendor Advisory
http://secunia.com/advisories/18347 Patch Vendor Advisory
http://secunia.com/advisories/18348 Patch Vendor Advisory
http://secunia.com/advisories/18350 Patch Vendor Advisory
http://secunia.com/advisories/18397 Patch Vendor Advisory
http://secunia.com/advisories/18403 Patch Vendor Advisory
http://secunia.com/advisories/18463 Patch Vendor Advisory
http://secunia.com/advisories/18517 Patch Vendor Advisory
http://securitytracker.com/id?1015446 Patch
http://www.debian.de/security/2006/dsa-935 Patch Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200601-05.xml Patch Vendor Advisory
http://www.giuseppetanzilli.it/mod_auth_pgsql2/
http://www.idefense.com/intelligence/vulnerabilities/display.php?id=367 Patch Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2006:009
http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00015.html Patch
http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00016.html Patch
http://www.redhat.com/support/errata/RHSA-2006-0164.html Patch
http://www.securityfocus.com/bid/16153 Patch
http://www.trustix.org/errata/2006/0002/ Patch
http://www.vupen.com/english/advisories/2006/0070
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10600
https://usn.ubuntu.com/239-1/
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:guiseppe_tanzilli_and_matthias_eckermann:mod_auth_pgsql:*:*:*:*:*:*:*:*
cpe:2.3:a:guiseppe_tanzilli_and_matthias_eckermann:mod_auth_pgsql:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:guiseppe_tanzilli_and_matthias_eckermann:mod_auth_pgsql:0.9.6:*:*:*:*:*:*:*

History

21 Nov 2024, 00:02

Type Values Removed Values Added
References () ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U - Patch () ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U - Patch
References () http://secunia.com/advisories/18304 - Patch, Vendor Advisory () http://secunia.com/advisories/18304 - Patch, Vendor Advisory
References () http://secunia.com/advisories/18321 - Patch, Vendor Advisory () http://secunia.com/advisories/18321 - Patch, Vendor Advisory
References () http://secunia.com/advisories/18347 - Patch, Vendor Advisory () http://secunia.com/advisories/18347 - Patch, Vendor Advisory
References () http://secunia.com/advisories/18348 - Patch, Vendor Advisory () http://secunia.com/advisories/18348 - Patch, Vendor Advisory
References () http://secunia.com/advisories/18350 - Patch, Vendor Advisory () http://secunia.com/advisories/18350 - Patch, Vendor Advisory
References () http://secunia.com/advisories/18397 - Patch, Vendor Advisory () http://secunia.com/advisories/18397 - Patch, Vendor Advisory
References () http://secunia.com/advisories/18403 - Patch, Vendor Advisory () http://secunia.com/advisories/18403 - Patch, Vendor Advisory
References () http://secunia.com/advisories/18463 - Patch, Vendor Advisory () http://secunia.com/advisories/18463 - Patch, Vendor Advisory
References () http://secunia.com/advisories/18517 - Patch, Vendor Advisory () http://secunia.com/advisories/18517 - Patch, Vendor Advisory
References () http://securitytracker.com/id?1015446 - Patch () http://securitytracker.com/id?1015446 - Patch
References () http://www.debian.de/security/2006/dsa-935 - Patch, Vendor Advisory () http://www.debian.de/security/2006/dsa-935 - Patch, Vendor Advisory
References () http://www.gentoo.org/security/en/glsa/glsa-200601-05.xml - Patch, Vendor Advisory () http://www.gentoo.org/security/en/glsa/glsa-200601-05.xml - Patch, Vendor Advisory
References () http://www.giuseppetanzilli.it/mod_auth_pgsql2/ - () http://www.giuseppetanzilli.it/mod_auth_pgsql2/ -
References () http://www.idefense.com/intelligence/vulnerabilities/display.php?id=367 - Patch, Vendor Advisory () http://www.idefense.com/intelligence/vulnerabilities/display.php?id=367 - Patch, Vendor Advisory
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:009 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:009 -
References () http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00015.html - Patch () http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00015.html - Patch
References () http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00016.html - Patch () http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00016.html - Patch
References () http://www.redhat.com/support/errata/RHSA-2006-0164.html - Patch () http://www.redhat.com/support/errata/RHSA-2006-0164.html - Patch
References () http://www.securityfocus.com/bid/16153 - Patch () http://www.securityfocus.com/bid/16153 - Patch
References () http://www.trustix.org/errata/2006/0002/ - Patch () http://www.trustix.org/errata/2006/0002/ - Patch
References () http://www.vupen.com/english/advisories/2006/0070 - () http://www.vupen.com/english/advisories/2006/0070 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10600 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10600 -
References () https://usn.ubuntu.com/239-1/ - () https://usn.ubuntu.com/239-1/ -

07 Nov 2023, 01:57

Type Values Removed Values Added
References
  • {'url': 'http://www.giuseppetanzilli.it/mod%5Fauth%5Fpgsql2/', 'name': 'http://www.giuseppetanzilli.it/mod%5Fauth%5Fpgsql2/', 'tags': ['Patch'], 'refsource': 'CONFIRM'}
  • () http://www.giuseppetanzilli.it/mod_auth_pgsql2/ -

Information

Published : 2005-12-31 05:00

Updated : 2024-11-21 00:02


NVD link : CVE-2005-3656

Mitre link : CVE-2005-3656

CVE.ORG link : CVE-2005-3656


JSON object : View

Products Affected

guiseppe_tanzilli_and_matthias_eckermann

  • mod_auth_pgsql
CWE
CWE-134

Use of Externally-Controlled Format String