Package: libpam-mysql
Severity: important
Tags: security

Hello,

CVE-2005-4713 and CVE-2006-0056 indicate that there are two vulnerabilities in
libpam-mysql. The first is a remote debian of service
vulnerability in the SQL logging facility of libpam-mysql. The second is
a "double-free" vulnerability. These issues allow local *and* remote
attackers to execute arbitrary machine code in the context of the
affected module. Attackers may also crash applications that use the PAM
module, denying service to legitimate users. Applications that execute
the PAM module with superuser privileges will allow attackers to
completely compromise affected computers. 

According to http://www.securityfocus.com/bid/16564 the versions in oldstable
(woody), stable (sarge) and testing/unstable are all vulnerabile to this
issue. 

The vendor has released versions 0.6.2 and 0.7pre3 of the affected
package to address these issues.

The official advisory is here:
http://sourceforge.net/forum/forum.php?forum_id=499394

Please mention these CVE ids in any changelog addressing this issue.

Thanks,
Micah

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.15-1-686-smp
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to