Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades.
http://rst.void.ru/papers/advisory24.txt
http://www.vuxml.org/freebsd/1033750f-cab4-11d9-9aed-000e0c2e438a.html
Insight
The following package is affected: oops
CVE-2005-1121
Format string vulnerability in the my_xlog function in lib.c for Oops! Proxy Server 1.5.23 and earlier, as called by the auth functions in the passwd_mysql and passwd_pgsql modules, may allow attackers to execute arbitrary code via a URL.
Severity
Classification
-
CVE CVE-2005-1121 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:N/I:P/A:N
Related Vulnerabilities