CVE-2008-2384
Published: 22 January 2009
SQL injection vulnerability in mod_auth_mysql.c in the mod-auth-mysql (aka libapache2-mod-auth-mysql) module for the Apache HTTP Server 2.x, when configured to use a multibyte character set that allows a \ (backslash) as part of the character encoding, allows remote attackers to execute arbitrary SQL commands via unspecified inputs in a login request.
Notes
Author | Note |
---|---|
mdeslaur |
Specifying an encoding was introduced by the 012-charset.dpatch patch in 4.3.9-10. Since we don't support specifying an encoding mysql won't decode the username and injection is not possible. |
Priority
Status
Package | Release | Status |
---|---|---|
libapache-mod-auth-mysql
Launchpad, Ubuntu, Debian |
dapper |
Not vulnerable
(no encoding support)
|
gutsy |
Not vulnerable
(no encoding support)
|
|
hardy |
Not vulnerable
(no encoding support)
|
|
intrepid |
Does not exist
|
|
upstream |
Released
(4.3.9-11)
|
|
mod-auth-mysql
Launchpad, Ubuntu, Debian |
dapper |
Does not exist
|
gutsy |
Does not exist
|
|
hardy |
Does not exist
|
|
intrepid |
Not vulnerable
(no encoding support)
|
|
upstream |
Released
(4.3.9-11)
|
|
Patches:
vendor: http://patch-tracking.debian.net/patch/series/view/mod-auth-mysql/4.3.9-11/013-CVE-2008-2384_charset |