Vulnerability Details : CVE-2005-3656
Multiple format string vulnerabilities in logging functions in mod_auth_pgsql before 2.0.3, when used for user authentication against a PostgreSQL database, allows remote unauthenticated attackers to execute arbitrary code, as demonstrated via the username.
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2005-3656
Probability of exploitation activity in the next 30 days: 7.82%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 94 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2005-3656
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2005-3656
-
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.Assigned by: nvd@nist.gov (Primary)
References for CVE-2005-3656
- ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
-
http://www.mandriva.com/security/advisories?name=MDKSA-2006:009
-
http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00015.html
Patch
-
http://www.vupen.com/english/advisories/2006/0070
-
http://www.securityfocus.com/bid/16153
Patch
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10600
-
https://usn.ubuntu.com/239-1/
-
http://www.debian.de/security/2006/dsa-935
Patch;Vendor Advisory
- http://www.trustix.org/errata/2006/0002/
-
http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00016.html
Patch
-
http://www.idefense.com/intelligence/vulnerabilities/display.php?id=367
Patch;Vendor Advisory
-
http://www.redhat.com/support/errata/RHSA-2006-0164.html
Patch
-
http://securitytracker.com/id?1015446
Patch
-
http://www.gentoo.org/security/en/glsa/glsa-200601-05.xml
Patch;Vendor Advisory
-
http://www.giuseppetanzilli.it/mod%5Fauth%5Fpgsql2/
Patch
Products affected by CVE-2005-3656
- cpe:2.3:a:guiseppe_tanzilli_and_matthias_eckermann:mod_auth_pgsql:*:*:*:*:*:*:*:*
- cpe:2.3:a:guiseppe_tanzilli_and_matthias_eckermann:mod_auth_pgsql:0.9.5:*:*:*:*:*:*:*
- cpe:2.3:a:guiseppe_tanzilli_and_matthias_eckermann:mod_auth_pgsql:0.9.6:*:*:*:*:*:*:*