RHSA-2006_0179
Vulnerability from csaf_redhat - Published: 2006-01-10 19:32 - Updated: 2024-11-22 00:09Summary
Red Hat Security Advisory: auth_ldap security update
Notes
Topic
An updated auth_ldap packages that fixes a format string security issue is
now available for Red Hat Enterprise Linux 2.1.
This update has been rated as having critical security impact by the Red
Hat Security Response Team.
Details
The auth_ldap package is an httpd module that allows user authentication
against information stored in an LDAP database.
A format string flaw was found in the way auth_ldap logs information. It
may be possible for a remote attacker to execute arbitrary code as the
'apache' user if auth_ldap is used for user authentication. The Common
Vulnerabilities and Exposures project assigned the name CVE-2006-0150
to this issue.
Note that this issue only affects servers that have auth_ldap installed and
configured to perform user authentication against an LDAP database.
All users of auth_ldap should upgrade to this updated package, which
contains a backported patch to resolve this issue.
This issue does not affect the Red Hat Enterprise Linux 3 or 4
distributions as they do not include the auth_ldap package.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated auth_ldap packages that fixes a format string security issue is\nnow available for Red Hat Enterprise Linux 2.1.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The auth_ldap package is an httpd module that allows user authentication\nagainst information stored in an LDAP database.\n\nA format string flaw was found in the way auth_ldap logs information. It\nmay be possible for a remote attacker to execute arbitrary code as the\n\u0027apache\u0027 user if auth_ldap is used for user authentication. The Common\nVulnerabilities and Exposures project assigned the name CVE-2006-0150\nto this issue.\n\nNote that this issue only affects servers that have auth_ldap installed and\nconfigured to perform user authentication against an LDAP database.\n\nAll users of auth_ldap should upgrade to this updated package, which\ncontains a backported patch to resolve this issue.\n\nThis issue does not affect the Red Hat Enterprise Linux 3 or 4\ndistributions as they do not include the auth_ldap package.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2006:0179",
"url": "https://access.redhat.com/errata/RHSA-2006:0179"
},
{
"category": "external",
"summary": "177421",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=177421"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0179.json"
}
],
"title": "Red Hat Security Advisory: auth_ldap security update",
"tracking": {
"current_release_date": "2024-11-22T00:09:02+00:00",
"generator": {
"date": "2024-11-22T00:09:02+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2006:0179",
"initial_release_date": "2006-01-10T19:32:00+00:00",
"revision_history": [
{
"date": "2006-01-10T19:32:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2006-01-10T00:00:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T00:09:02+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product": {
"name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Linux Advanced Workstation 2.1",
"product": {
"name": "Red Hat Linux Advanced Workstation 2.1",
"product_id": "Red Hat Linux Advanced Workstation 2.1",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 2.1",
"product": {
"name": "Red Hat Enterprise Linux ES version 2.1",
"product_id": "Red Hat Enterprise Linux ES version 2.1",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 2.1",
"product": {
"name": "Red Hat Enterprise Linux WS version 2.1",
"product_id": "Red Hat Enterprise Linux WS version 2.1",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2006-0150",
"discovery_date": "2006-01-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1617875"
}
],
"notes": [
{
"category": "description",
"text": "Multiple format string vulnerabilities in the auth_ldap_log_reason function in Apache auth_ldap 1.6.0 and earlier allows remote attackers to execute arbitrary code via various vectors, including the username.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-0150"
},
{
"category": "external",
"summary": "RHBZ#1617875",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617875"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-0150",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-0150"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-0150",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-0150"
}
],
"release_date": "2006-01-09T18:36:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-01-10T19:32:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0179"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…