Synopsis
The remote CentOS host is missing a security update.
Description
Updated mod_auth_pgsql packages that fix format string security issues are now available for Red Hat Enterprise Linux 3 and 4.
This update has been rated as having critical security impact by the Red Hat Security Response Team.
The mod_auth_pgsql package is an httpd module that allows user authentication against information stored in a PostgreSQL database.
Several format string flaws were found in the way mod_auth_pgsql logs information. It may be possible for a remote attacker to execute arbitrary code as the 'apache' user if mod_auth_pgsql is used for user authentication. The Common Vulnerabilities and Exposures project assigned the name CVE-2005-3656 to this issue.
Please note that this issue only affects servers which have mod_auth_pgsql installed and configured to perform user authentication against a PostgreSQL database.
All users of mod_auth_pgsql should upgrade to these updated packages, which contain a backported patch to resolve this issue.
This issue does not affect the mod_auth_pgsql package supplied with Red Hat Enterprise Linux 2.1.
Red Hat would like to thank iDefense for reporting this issue.
Solution
Update the affected mod_auth_pgsql package.
Plugin Details
File Name: centos_RHSA-2006-0164.nasl
Agent: unix
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Information
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Vulnerability Information
CPE: cpe:/o:centos:centos:3, p-cpe:/a:centos:centos:mod_auth_pgsql, cpe:/o:centos:centos:4
Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list
Patch Publication Date: 1/6/2006
Vulnerability Publication Date: 12/31/2005