SQL injection vulnerability in mod_auth_mysql.c in the mod-auth-mysql (aka libapache2-mod-auth-mysql) module for the Apache HTTP Server 2.x, when configured to use a multibyte character set that allows a \ (backslash) as part of the character encoding, allows remote attackers to execute arbitrary SQL commands via unspecified inputs in a login request.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10172
https://exchange.xforce.ibmcloud.com/vulnerabilities/48163
https://bugzilla.redhat.com/show_bug.cgi?id=480238
http://www.vupen.com/english/advisories/2011/0367
http://www.vupen.com/english/advisories/2009/0226
http://www.securityfocus.com/bid/33392
http://www.redhat.com/support/errata/RHSA-2010-1002.html
http://www.redhat.com/support/errata/RHSA-2009-0259.html
http://secunia.com/advisories/43302
http://secunia.com/advisories/33627
http://openwall.com/lists/oss-security/2009/01/21/10
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053903.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053899.html
http://klecker.debian.org/~white/mod-auth-mysql/CVE-2008-2384_mod-auth-mysql.patch