Format string vulnerability in the my_xlog function in lib.c for Oops! Proxy Server 1.5.23 and earlier, as called by the auth functions in the passwd_mysql and passwd_pgsql modules, may allow attackers to execute arbitrary code via a URL.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/13172 | Patch |
http://rst.void.ru/papers/advisory24.txt | Exploit Patch Vendor Advisory |
http://security.gentoo.org/glsa/glsa-200505-02.xml | Patch Vendor Advisory |
http://www.debian.org/security/2005/dsa-726 | Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/20191 |
Information
Published : 2005-05-01 21:00
Updated : 2017-07-10 18:32
NVD link : CVE-2005-1121
Mitre link : CVE-2005-1121
JSON object : View
CWE
Products Affected
gentoo
- linux
igor_khasilev
- oops_proxy_server