Scientific Linux Security Update for mod_auth_mysql on SL6.x i386/x86_64. Flaw found in multibyte-encoded strings escaping, allowing SQL injection. Restart httpd after update
Reporter | Title | Published | Views | Family All 37 |
---|---|---|---|---|
![]() | Oracle Linux 5 : mod_auth_mysql (ELSA-2009-0259) | 12 Jul 201300:00 | โ | nessus |
![]() | SuSE 10 Security Update : apache2-mod_auth_mysql (ZYPP Patch Number 7683) | 13 Dec 201100:00 | โ | nessus |
![]() | Mandriva Linux Security Advisory : apache-mod_auth_mysql (MDVSA-2009:189-1) | 3 Aug 200900:00 | โ | nessus |
![]() | Mod_auth_mysql Multibyte Encoding SQL Injection | 22 Feb 201100:00 | โ | nessus |
![]() | RHEL 5 : mod_auth_mysql (RHSA-2009:0259) | 12 Feb 200900:00 | โ | nessus |
![]() | SuSE 10 Security Update : apache2-mod_auth_mysql (ZYPP Patch Number 7682) | 31 Aug 201100:00 | โ | nessus |
![]() | RHEL 6 : mod_auth_mysql (RHSA-2010:1002) | 22 Dec 201000:00 | โ | nessus |
![]() | Fedora 14 : mod_auth_mysql-3.0.0-12.fc14 (2011-0100) | 11 Feb 201100:00 | โ | nessus |
![]() | Oracle Linux 6 : mod_auth_mysql (ELSA-2010-1002) | 12 Jul 201300:00 | โ | nessus |
![]() | Fedora 13 : mod_auth_mysql-3.0.0-12.fc13 (2011-0114) | 11 Feb 201100:00 | โ | nessus |
Source | Link |
---|---|
nessus | www.nessus.org/u |
cve | www.cve.mitre.org/cgi-bin/cvename.cgi |
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text is (C) Scientific Linux.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(60928);
script_version("1.5");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/14");
script_cve_id("CVE-2008-2384");
script_name(english:"Scientific Linux Security Update : mod_auth_mysql on SL6.x i386/x86_64");
script_summary(english:"Checks rpm output for the updated package");
script_set_attribute(
attribute:"synopsis",
value:"The remote Scientific Linux host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
"A flaw was found in the way mod_auth_mysql escaped certain
multibyte-encoded strings. If mod_auth_mysql was configured to use a
multibyte character set that allowed a backslash ('\') as part of the
character encodings, a remote attacker could inject arbitrary SQL
commands into a login request. (CVE-2008-2384)
Note: This flaw only affected non-default installations where
AuthMySQLCharacterSet is configured to use one of the affected
multibyte character sets. Installations that did not use the
AuthMySQLCharacterSet configuration option were not vulnerable to this
flaw.
After installing the updated package, the httpd daemon must be
restarted for the update to take effect."
);
# https://listserv.fnal.gov/scripts/wa.exe?A2=ind1103&L=scientific-linux-errata&T=0&P=4542
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?a4042b82"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected mod_auth_mysql package."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_cwe_id(89);
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"x-cpe:/o:fermilab:scientific_linux");
script_set_attribute(attribute:"patch_publication_date", value:"2010/12/21");
script_set_attribute(attribute:"plugin_publication_date", value:"2012/08/01");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Scientific Linux Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/RedHat/release", "Host/RedHat/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Scientific Linux " >!< release) audit(AUDIT_HOST_NOT, "running Scientific Linux");
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if (cpu >!< "x86_64" && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Scientific Linux", cpu);
flag = 0;
if (rpm_check(release:"SL6", reference:"mod_auth_mysql-3.0.0-11.el6_0.1")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo