Executive Summary
Summary | |
---|---|
Title | libapache2-mod-auth-pgsql vulnerability |
Informations | |||
---|---|---|---|
Name | USN-239-1 | First vendor Publication | 2006-01-09 |
Vendor | Ubuntu | Last vendor Modification | 2006-01-09 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects the following Ubuntu releases: Ubuntu 4.10 (Warty Warthog) Ubuntu 5.04 (Hoary Hedgehog) Ubuntu 5.10 (Breezy Badger) The following packages are affected: libapache2-mod-auth-pgsql The problem can be corrected by upgrading the affected package to version 2.0.2b1-2ubuntu0.1 (for Ubuntu 4.10), 2.0.2b1-5ubuntu0.1 (for Ubuntu 5.04), or 2.0.2b1-6ubuntu0.1 (for Ubuntu 5.10). After a standard system upgrade you need to restart the Apache 2 server to effect the necessary changes: sudo /etc/init.d/apache2 restart Details follow: Several format string vulnerabilities were discovered in the error logging handling. By sending specially crafted user names, an unauthenticated remote attacker could exploit this to crash the Apache server or possibly even execute arbitrary code with the privileges of Apache (user 'www-data'). |
Original Source
Url : http://www.ubuntu.com/usn/USN-239-1 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-134 | Uncontrolled Format String (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:10600 | |||
Oval ID: | oval:org.mitre.oval:def:10600 | ||
Title: | Multiple format string vulnerabilities in logging functions in mod_auth_pgsql before 2.0.3, when used for user authentication against a PostgreSQL database, allows remote unauthenticated attackers to execute arbitrary code, as demonstrated via the username. | ||
Description: | Multiple format string vulnerabilities in logging functions in mod_auth_pgsql before 2.0.3, when used for user authentication against a PostgreSQL database, allows remote unauthenticated attackers to execute arbitrary code, as demonstrated via the username. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2005-3656 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 2 |
OpenVAS Exploits
Date | Description |
---|---|
2008-09-24 | Name : Gentoo Security Advisory GLSA 200601-05 (mod_auth_pgsql) File : nvt/glsa_200601_05.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 935-1 (libapache2-mod-auth-pgsql) File : nvt/deb_935_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
22259 | mod_auth_pgsql for Apache HTTP Server Log Function Format String |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Apache mod_auth_pgsql module logging facility format string exploit attempt RuleID : 16198 - Revision : 8 - Type : SERVER-APACHE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2006-10-14 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-935.nasl - Type : ACT_GATHER_INFO |
2006-07-03 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2006-0164.nasl - Type : ACT_GATHER_INFO |
2006-01-21 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-239-1.nasl - Type : ACT_GATHER_INFO |
2006-01-15 | Name : The remote Fedora Core host is missing a security update. File : fedora_2006-014.nasl - Type : ACT_GATHER_INFO |
2006-01-15 | Name : The remote Fedora Core host is missing a security update. File : fedora_2006-015.nasl - Type : ACT_GATHER_INFO |
2006-01-15 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200601-05.nasl - Type : ACT_GATHER_INFO |
2006-01-15 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2006-009.nasl - Type : ACT_GATHER_INFO |
2006-01-11 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2006-0164.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 12:03:14 |
|