Vulnerability Description
Format string vulnerability in the my_xlog function in lib.c for Oops! Proxy Server 1.5.23 and earlier, as called by the auth functions in the passwd_mysql and passwd_pgsql modules, may allow attackers to execute arbitrary code via a URL.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Igor Khasilev | Oops Proxy Server | 1.4.22 |
| Gentoo | Linux | All versions |
References
- http://rst.void.ru/papers/advisory24.txtExploitPatchVendor Advisory
- http://security.gentoo.org/glsa/glsa-200505-02.xmlPatchVendor Advisory
- http://www.debian.org/security/2005/dsa-726PatchVendor Advisory
- http://www.securityfocus.com/bid/13172Patch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/20191
- http://rst.void.ru/papers/advisory24.txtExploitPatchVendor Advisory
- http://security.gentoo.org/glsa/glsa-200505-02.xmlPatchVendor Advisory
- http://www.debian.org/security/2005/dsa-726PatchVendor Advisory
- http://www.securityfocus.com/bid/13172Patch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/20191
FAQ
What is CVE-2005-1121?
CVE-2005-1121 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Format string vulnerability in the my_xlog function in lib.c for Oops! Proxy Server 1.5.23 and earlier, as called by the auth functions in the passwd_mysql and passwd_pgsql modules, may allow attacker...
How severe is CVE-2005-1121?
CVE-2005-1121 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-1121?
Check the references section above for vendor advisories and patch information. Affected products include: Igor Khasilev Oops Proxy Server, Gentoo Linux.