Msntauth Squid authentication module format string

msntauth-squid-format-string (9248) The risk level is classified as HighHigh Risk

Description:

Msntauth could allow a remote attacker to execute arbitrary code on an affected system, caused by a format string vulnerability in the code that processes the username and password. A remote attacker could pass arbitrary shell commands to a vulnerable server using a malformed username, which would be executed on the system with elevated privileges.


Consequences:

Gain Access

Remedy:

No remedy available as of September 1, 2014.

References:

  • Stellar-x Software Web site: Stellar-X software downloads.
  • VulnWatch Mailing List, Mon Jun 03 2002 - 21:25:18 CDT: [DER #11] - Remotey exploitable fmt string bug in squid. (From Neohapsis archive)
  • BID-4929: Stellar-X MSNTAuth Syslog Format String Vulnerability
  • CVE-2002-0916: Format string vulnerability in the allowuser code for the Stellar-X msntauth authentication module, as distributed in Squid 2.4.STABLE6 and earlier, allows remote attackers to execute arbitrary code via format strings in the user name, which are not properly handled in a syslog call.
  • OSVDB ID: 5050: Squid Stellar-X Module msntauth User Name Format String

Platforms Affected:

  • Stellar-X Msntauth 2.0.3 and prior

Reported:

Jun 04, 2002

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page