| Vulnerability Name: | CVE-2003-0672 (CCN-12859) | ||||||||
| Assigned: | 2003-08-08 | ||||||||
| Published: | 2003-08-08 | ||||||||
| Updated: | 2008-09-10 | ||||||||
| Summary: | Format string vulnerability in pam-pgsql 0.5.2 and earlier allows remote attackers to execute arbitrary code via the username that isp rovided during authentication, which is not properly handled when recording a log message. | ||||||||
| CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
| CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
| Vulnerability Type: | CWE-Other | ||||||||
| Vulnerability Consequences: | Gain Privileges | ||||||||
| References: | Source: MITRE Type: CNA CVE-2003-0672 Source: DEBIAN Type: Patch, Vendor Advisory DSA-370 Source: DEBIAN Type: DSA-370 pam-pgsql -- format string Source: CCN Type: OSVDB ID: 2384 pam-pgsql Username Format String Source: CCN Type: BID-8379 Pam-PGSQL Username Logging Remote Format String Vulnerability Source: XF Type: UNKNOWN pam-pgsql-format-string(12859) | ||||||||
| Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||
| Oval Definitions | |||||||||
| |||||||||
| BACK | |||||||||