View | Details | Raw Unified | Return to bug 202957 | Differences between
and this patch

Collapse All | Expand All

(-)vuln.xml (+31 lines)
Lines 58-63 Link Here
58
58
59
-->
59
-->
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
61
  <vuln vid="d76961da-56f6-11e5-934b-002590263bf5">
62
    <topic>pgbouncer -- failed auth_query lookup leads to connection as auth_user</topic>
63
    <affects>
64
      <package>
65
	<name>pgbouncer</name>
66
	<range><eq>1.6.0</eq></range>
67
      </package>
68
    </affects>
69
    <description>
70
      <body xmlns="http://www.w3.org/1999/xhtml">
71
	<p>PgBouncer reports:</p>
72
	<blockquote cite="http://pgbouncer.github.io/2015/09/pgbouncer-1-6-1/">
73
	  <p>New auth_user functionality introduced in 1.6 allows login as
74
	    auth_user when client presents unknown username. It's quite likely
75
	    auth_user is superuser. Affects only setups that have enabled
76
	    auth_user in their config.</p>
77
	</blockquote>
78
      </body>
79
    </description>
80
    <references>
81
      <cvename>CVE-2015-6817</cvename>
82
      <url>https://pgbouncer.github.io/2015/09/pgbouncer-1-6-1/</url>
83
      <url>https://github.com/pgbouncer/pgbouncer/issues/69</url>
84
      <url>http://www.openwall.com/lists/oss-security/2015/09/04/3</url>
85
    </references>
86
    <dates>
87
      <discovery>2015-09-03</discovery>
88
      <entry>2015-09-09</entry>
89
    </dates>
90
  </vuln>
91
61
  <vuln vid="3904f759-5659-11e5-a207-6805ca0b3d42">
92
  <vuln vid="3904f759-5659-11e5-a207-6805ca0b3d42">
62
    <topic>phpMyAdmin -- reCaptcha bypass</topic>
93
    <topic>phpMyAdmin -- reCaptcha bypass</topic>
63
    <affects>
94
    <affects>

Return to bug 202957