Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <Pine.GSO.4.51.0901221718140.27455@faron.mitre.org>
Date: Thu, 22 Jan 2009 17:18:19 -0500 (EST)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: oss-security@...ts.openwall.com
cc: coley@...us.mitre.org
Subject: Re: mod-auth-mysql: SQL injection


======================================================
Name: CVE-2008-2384
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2384
Reference: MLIST:[oss-security] 20090121 mod-auth-mysql: SQL injection
Reference: URL:http://openwall.com/lists/oss-security/2009/01/21/10
Reference: CONFIRM:http://klecker.debian.org/~white/mod-auth-mysql/CVE-2008-2384_mod-auth-mysql.patch
Reference: BID:33392
Reference: URL:http://www.securityfocus.com/bid/33392

SQL injection vulnerability in mod_auth_mysql.c in the mod-auth-mysql
(aka libapache2-mod-auth-mysql) module for the Apache HTTP Server 2.x
allows remote attackers to execute arbitrary SQL commands via
multibyte character encodings for unspecified input.


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.