Lucene search

K
amazonAmazonALAS-2012-082
HistoryMay 23, 2012 - 10:08 a.m.

Medium: postgresql8

2012-05-2310:08:00
alas.aws.amazon.com
12

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.009 Low

EPSS

Percentile

82.9%

Issue Overview:

The pg_dump utility inserted object names literally into comments in the SQL script it produces. An unprivileged database user could create an object whose name includes a newline followed by an SQL command. This SQL command might then be executed by a privileged user during later restore of the backup dump, allowing privilege escalation. (CVE-2012-0868)

When configured to do SSL certificate verification, PostgreSQL only checked the first 31 characters of the certificate’s Common Name field. Depending on the configuration, this could allow an attacker to impersonate a server or a client using a certificate from a trusted Certificate Authority issued for a different name. (CVE-2012-0867)

CREATE TRIGGER did not do a permissions check on the trigger function to be called. This could possibly allow an authenticated database user to call a privileged trigger function on data of their choosing. (CVE-2012-0866)

Affected Packages:

postgresql8

Issue Correction:
Run yum update postgresql8 to update your system.

New Packages:

i686:  
    postgresql8-libs-8.4.11-1.34.amzn1.i686  
    postgresql8-test-8.4.11-1.34.amzn1.i686  
    postgresql8-8.4.11-1.34.amzn1.i686  
    postgresql8-plperl-8.4.11-1.34.amzn1.i686  
    postgresql8-contrib-8.4.11-1.34.amzn1.i686  
    postgresql8-debuginfo-8.4.11-1.34.amzn1.i686  
    postgresql8-pltcl-8.4.11-1.34.amzn1.i686  
    postgresql8-plpython-8.4.11-1.34.amzn1.i686  
    postgresql8-docs-8.4.11-1.34.amzn1.i686  
    postgresql8-devel-8.4.11-1.34.amzn1.i686  
    postgresql8-server-8.4.11-1.34.amzn1.i686  
  
src:  
    postgresql8-8.4.11-1.34.amzn1.src  
  
x86_64:  
    postgresql8-pltcl-8.4.11-1.34.amzn1.x86_64  
    postgresql8-debuginfo-8.4.11-1.34.amzn1.x86_64  
    postgresql8-plpython-8.4.11-1.34.amzn1.x86_64  
    postgresql8-docs-8.4.11-1.34.amzn1.x86_64  
    postgresql8-plperl-8.4.11-1.34.amzn1.x86_64  
    postgresql8-devel-8.4.11-1.34.amzn1.x86_64  
    postgresql8-libs-8.4.11-1.34.amzn1.x86_64  
    postgresql8-contrib-8.4.11-1.34.amzn1.x86_64  
    postgresql8-server-8.4.11-1.34.amzn1.x86_64  
    postgresql8-test-8.4.11-1.34.amzn1.x86_64  
    postgresql8-8.4.11-1.34.amzn1.x86_64  

Additional References

Red Hat: CVE-2012-0866, CVE-2012-0867, CVE-2012-0868

Mitre: CVE-2012-0866, CVE-2012-0867, CVE-2012-0868

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.009 Low

EPSS

Percentile

82.9%