Lucene search

K
amazonAmazonALAS-2012-094
HistoryJul 05, 2012 - 4:08 p.m.

Medium: postgresql8

2012-07-0516:08:00
alas.aws.amazon.com
18

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.012 Low

EPSS

Percentile

85.0%

Issue Overview:

A flaw was found in the way the crypt() password hashing function from the optional PostgreSQL pgcrypto contrib module performed password transformation when used with the DES algorithm. If the password string to be hashed contained the 0x80 byte value, the remainder of the string was ignored when calculating the hash, significantly reducing the password strength. This made brute-force guessing more efficient as the whole password was not required to gain access to protected resources. (CVE-2012-2143)

Note: With this update, the rest of the string is properly included in the DES hash; therefore, any previously stored password values that are affected by this issue will no longer match. In such cases, it will be necessary for those stored password hashes to be updated.

A denial of service flaw was found in the way the PostgreSQL server performed a user privileges check when applying SECURITY DEFINER or SET attributes to a procedural language’s (such as PL/Perl or PL/Python) call handler function. A non-superuser database owner could use this flaw to cause the PostgreSQL server to crash due to infinite recursion. (CVE-2012-2655)

Affected Packages:

postgresql8

Issue Correction:
Run yum update postgresql8 to update your system.

New Packages:

i686:  
    postgresql8-test-8.4.12-1.35.amzn1.i686  
    postgresql8-pltcl-8.4.12-1.35.amzn1.i686  
    postgresql8-plperl-8.4.12-1.35.amzn1.i686  
    postgresql8-contrib-8.4.12-1.35.amzn1.i686  
    postgresql8-docs-8.4.12-1.35.amzn1.i686  
    postgresql8-debuginfo-8.4.12-1.35.amzn1.i686  
    postgresql8-server-8.4.12-1.35.amzn1.i686  
    postgresql8-8.4.12-1.35.amzn1.i686  
    postgresql8-libs-8.4.12-1.35.amzn1.i686  
    postgresql8-plpython-8.4.12-1.35.amzn1.i686  
    postgresql8-devel-8.4.12-1.35.amzn1.i686  
  
src:  
    postgresql8-8.4.12-1.35.amzn1.src  
  
x86_64:  
    postgresql8-plpython-8.4.12-1.35.amzn1.x86_64  
    postgresql8-devel-8.4.12-1.35.amzn1.x86_64  
    postgresql8-debuginfo-8.4.12-1.35.amzn1.x86_64  
    postgresql8-plperl-8.4.12-1.35.amzn1.x86_64  
    postgresql8-contrib-8.4.12-1.35.amzn1.x86_64  
    postgresql8-8.4.12-1.35.amzn1.x86_64  
    postgresql8-test-8.4.12-1.35.amzn1.x86_64  
    postgresql8-docs-8.4.12-1.35.amzn1.x86_64  
    postgresql8-server-8.4.12-1.35.amzn1.x86_64  
    postgresql8-libs-8.4.12-1.35.amzn1.x86_64  
    postgresql8-pltcl-8.4.12-1.35.amzn1.x86_64  

Additional References

Red Hat: CVE-2012-2143, CVE-2012-2655

Mitre: CVE-2012-2143, CVE-2012-2655

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.012 Low

EPSS

Percentile

85.0%