Vulnerability Name: | CVE-2005-3656 (CCN-24003) |
Assigned: | 2005-12-31 |
Published: | 2005-12-31 |
Updated: | 2018-10-03 |
Summary: | Multiple format string vulnerabilities in logging functions in mod_auth_pgsql before 2.0.3, when used for user authentication against a PostgreSQL database, allows remote unauthenticated attackers to execute arbitrary code, as demonstrated via the username. |
CVSS v3 Severity: | 9.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): High Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Changed
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High |
|
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C) 7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete | 7.6 High (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C) 5.6 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): High Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete |
|
Vulnerability Type: | CWE-134
|
Vulnerability Consequences: | Gain Access |
References: | Source: SGI Type: Patch 20060101-01-U
Source: MITRE Type: CNA CVE-2005-3656
Source: CCN Type: RHSA-2006-0164 mod_auth_pgsql security update
Source: CCN Type: SA18304 mod_auth_pgsql Apache Module Format String Vulnerabilities
Source: SECUNIA Type: Patch, Vendor Advisory 18304
Source: SECUNIA Type: Patch, Vendor Advisory 18321
Source: SECUNIA Type: Patch, Vendor Advisory 18347
Source: SECUNIA Type: Patch, Vendor Advisory 18348
Source: SECUNIA Type: Patch, Vendor Advisory 18350
Source: SECUNIA Type: Patch, Vendor Advisory 18397
Source: SECUNIA Type: Patch, Vendor Advisory 18403
Source: SECUNIA Type: Patch, Vendor Advisory 18463
Source: SECUNIA Type: Patch, Vendor Advisory 18517
Source: CCN Type: SECTRACK ID: 1015446 mod_auth_pgsql Format String Bugs Let Remote Users Execute Arbitrary Code
Source: SECTRACK Type: Patch 1015446
Source: CCN Type: ASA-2006-003 mod_auth_pgsql security update (RHSA-2006-0164)
Source: DEBIAN Type: Patch, Vendor Advisory DSA-935
Source: DEBIAN Type: DSA-935 libapache2-mod-auth-pgsql -- format string vulnerability
Source: CCN Type: GLSA-200601-05 mod_auth_pgsql: Multiple format string vulnerabilities
Source: GENTOO Type: Patch, Vendor Advisory GLSA-200601-05
Source: CONFIRM Type: Patch http://www.giuseppetanzilli.it/mod%5Fauth%5Fpgsql2/
Source: CCN Type: mod_auth_pgsql Web page Apache2 Module mod_auth_pgsql
Source: IDEFENSE Type: Patch, Vendor Advisory 20060109 Multiple Vendor mod_auth_pgsql Format String Vulnerability
Source: MANDRIVA Type: UNKNOWN MDKSA-2006:009
Source: CONFIRM Type: Patch http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00015.html
Source: CONFIRM Type: Patch http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00016.html
Source: REDHAT Type: Patch RHSA-2006:0164
Source: BID Type: Patch 16153
Source: CCN Type: BID-16153 Apache mod_auth_pgsql Multiple Format String Vulnerabilities
Source: TRUSTIX Type: Patch 2006-0002
Source: CCN Type: USN-239-1 libapache2-mod-auth-pgsqlvulnerability
Source: VUPEN Type: UNKNOWN ADV-2006-0070
Source: XF Type: UNKNOWN apache-modauthpgsql-format-string(24003)
Source: CCN Type: iDEFENSE Security Advisory 01.09.06 Multiple Vendor mod_auth_pgsql Format String Vulnerability
Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:10600
Source: UBUNTU Type: UNKNOWN USN-239-1
|
Vulnerable Configuration: | Configuration 1: cpe:/a:guiseppe_tanzilli_and_matthias_eckermann:mod_auth_pgsql:0.9.5:*:*:*:*:*:*:*OR cpe:/a:guiseppe_tanzilli_and_matthias_eckermann:mod_auth_pgsql:0.9.6:*:*:*:*:*:*:*OR cpe:/a:guiseppe_tanzilli_and_matthias_eckermann:mod_auth_pgsql:*:*:*:*:*:*:*:* (Version <= 2.0.3) Configuration RedHat 1: cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:* Configuration RedHat 2: cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* Configuration RedHat 3: cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* Configuration RedHat 4: cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* Configuration RedHat 5: cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* Configuration CCN 1: cpe:/a:guiseppe_tanzilli_and_matthias_eckermann:mod_auth_pgsql:0.9.5:*:*:*:*:*:*:*OR cpe:/a:guiseppe_tanzilli_and_matthias_eckermann:mod_auth_pgsql:2.0.3:*:*:*:*:*:*:*OR cpe:/a:guiseppe_tanzilli_and_matthias_eckermann:mod_auth_pgsql:0.9.6:*:*:*:*:*:*:*AND cpe:/o:debian:debian_linux:2.0:*:*:*:*:*:*:*OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:10.1::x86-64:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:2006::x86-64:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
Definition ID | Class | Title | Last Modified |
---|
oval:org.mitre.oval:def:10600 | V | Multiple format string vulnerabilities in logging functions in mod_auth_pgsql before 2.0.3, when used for user authentication against a PostgreSQL database, allows remote unauthenticated attackers to execute arbitrary code, as demonstrated via the username. | 2013-04-29 | oval:org.debian:def:935 | V | format string vulnerability | 2006-01-10 | oval:com.redhat.rhsa:def:20060164 | P | RHSA-2006:0164: mod_auth_pgsql security update (Critical) | 2006-01-06 |
|
BACK |
guiseppe_tanzilli_and_matthias_eckermann mod auth pgsql 0.9.5
guiseppe_tanzilli_and_matthias_eckermann mod auth pgsql 0.9.6
guiseppe_tanzilli_and_matthias_eckermann mod auth pgsql *
guiseppe_tanzilli_and_matthias_eckermann mod auth pgsql 0.9.5
guiseppe_tanzilli_and_matthias_eckermann mod auth pgsql 2.0.3
guiseppe_tanzilli_and_matthias_eckermann mod auth pgsql 0.9.6
debian debian linux 2.0
gentoo linux *
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
mandrakesoft mandrake linux 10.1
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
debian debian linux 3.1
mandrakesoft mandrake linux 2006
mandrakesoft mandrake linux 10.1
mandrakesoft mandrake linux 2006