First published: Sat Apr 16 2005(Updated: )
Format string vulnerability in the my_xlog function in lib.c for Oops! Proxy Server 1.5.23 and earlier, as called by the auth functions in the passwd_mysql and passwd_pgsql modules, may allow attackers to execute arbitrary code via a URL.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Igor Khasilev Oops Proxy Server | =1.5.19 | |
Igor Khasilev Oops Proxy Server | =1.5.53 | |
Igor Khasilev Oops Proxy Server | =1.4.22 | |
Gentoo Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1121 is a critical severity vulnerability that may allow attackers to execute arbitrary code.
To fix CVE-2005-1121, upgrade to Oops Proxy Server version 1.5.24 or later.
CVE-2005-1121 affects Oops Proxy Server versions 1.5.23 and earlier, as well as potentially Gentoo Linux.
Yes, CVE-2005-1121 can be exploited remotely via crafted URLs.
CVE-2005-1121 is a format string vulnerability.