iDEFENSE has reported a format string flaw in mod_auth_pgsql. This could allow a remote unauthenticated attacker to execute arbitrary code as the httpd process.
This issue should also affect RHEL2.1 and RHEL3
RHEL2.1 uses version 0.9.9 of mod_auth_pgsql which uses different a different mechanism for logging of failures and is not affected by this vulnerability.
This issue is public: http://www.giuseppetanzilli.it/mod%5Fauth%5Fpgsql2/
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2006-0164.html