Gentoo Archives: gentoo-announce

From: Stefan Cornelius <dercorny@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200601-05 ] mod_auth_pgsql: Multiple format string vulnerabilities
Date: Tue, 10 Jan 2006 20:19:40
Message-Id: 200601102051.32366.dercorny@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200601-05
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: High
8 Title: mod_auth_pgsql: Multiple format string vulnerabilities
9 Date: January 10, 2006
10 Bugs: #118096
11 ID: 200601-05
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Format string vulnerabilities in mod_auth_pgsql may lead to the
19 execution of arbitrary code.
20
21 Background
22 ==========
23
24 mod_auth_pgsql is an Apache2 module that allows user authentication
25 against a PostgreSQL database.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 net-www/mod_auth_pgsql < 2.0.3 >= 2.0.3
34
35 Description
36 ===========
37
38 The error logging functions of mod_auth_pgsql fail to validate certain
39 strings before passing them to syslog, resulting in format string
40 vulnerabilities.
41
42 Impact
43 ======
44
45 An unauthenticated remote attacker could exploit these vulnerabilities
46 to execute arbitrary code with the rights of the user running the
47 Apache2 server by sending specially crafted login names.
48
49 Workaround
50 ==========
51
52 There is no known workaround at this time.
53
54 Resolution
55 ==========
56
57 All mod_auth_pgsql users should upgrade to the latest version:
58
59 # emerge --sync
60 # emerge --ask --oneshot --verbose ">=net-www/mod_auth_pgsql-2.0.3"
61
62 References
63 ==========
64
65 [ 1 ] CVE-2005-3656
66 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3656
67 [ 2 ] FrSIRT ADV-2006-0070
68 http://www.frsirt.com/english/advisories/2006/0070
69
70 Availability
71 ============
72
73 This GLSA and any updates to it are available for viewing at
74 the Gentoo Security Website:
75
76 http://security.gentoo.org/glsa/glsa-200601-05.xml
77
78 Concerns?
79 =========
80
81 Security is a primary focus of Gentoo Linux and ensuring the
82 confidentiality and security of our users machines is of utmost
83 importance to us. Any security concerns should be addressed to
84 security@g.o or alternatively, you may file a bug at
85 http://bugs.gentoo.org.
86
87 License
88 =======
89
90 Copyright 2006 Gentoo Foundation, Inc; referenced text
91 belongs to its owner(s).
92
93 The contents of this document are licensed under the
94 Creative Commons - Attribution / Share Alike license.
95
96 http://creativecommons.org/licenses/by-sa/2.0