Format string vulnerability in the my_xlog function in lib.c for Oops! Proxy Server 1.5.23 and earlier, as called by the auth functions in the passwd_mysql and passwd_pgsql modules, may allow attackers to execute arbitrary code via a URL.
Link | Tags |
---|---|
http://security.gentoo.org/glsa/glsa-200505-02.xml | patch vendor advisory |
http://www.debian.org/security/2005/dsa-726 | patch vendor advisory |
http://rst.void.ru/papers/advisory24.txt | exploit patch vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/20191 | vdb entry |
http://www.securityfocus.com/bid/13172 | vdb entry patch |