7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.28 Low
EPSS
Percentile
96.9%
Issue Overview:
pg_user_mappings view discloses passwords to users lacking server privileges:
An authorization flaw was found in the way PostgreSQL handled access to the pg_user_mappings view on foreign servers. A remote authenticated attacker could potentially use this flaw to retrieve passwords from the user mappings defined by the foreign server owners without actually having the privileges to do so. (CVE-2017-7547)
Empty password accepted in some authentication methods:
It was found that authenticating to a PostgreSQL database account with an empty password was possible despite libpq’s refusal to send an empty password. A remote attacker could potentially use this flaw to gain access to database accounts with empty passwords. (CVE-2017-7546)
Affected Packages:
postgresql93, postgresql92
Issue Correction:
Run yum update postgresql93 to update your system.
Run yum update postgresql92 to update your system.
New Packages:
i686:
postgresql93-debuginfo-9.3.18-1.64.amzn1.i686
postgresql93-test-9.3.18-1.64.amzn1.i686
postgresql93-plpython27-9.3.18-1.64.amzn1.i686
postgresql93-contrib-9.3.18-1.64.amzn1.i686
postgresql93-9.3.18-1.64.amzn1.i686
postgresql93-devel-9.3.18-1.64.amzn1.i686
postgresql93-docs-9.3.18-1.64.amzn1.i686
postgresql93-pltcl-9.3.18-1.64.amzn1.i686
postgresql93-plpython26-9.3.18-1.64.amzn1.i686
postgresql93-libs-9.3.18-1.64.amzn1.i686
postgresql93-server-9.3.18-1.64.amzn1.i686
postgresql93-plperl-9.3.18-1.64.amzn1.i686
postgresql92-server-9.2.22-1.61.amzn1.i686
postgresql92-plpython27-9.2.22-1.61.amzn1.i686
postgresql92-debuginfo-9.2.22-1.61.amzn1.i686
postgresql92-contrib-9.2.22-1.61.amzn1.i686
postgresql92-9.2.22-1.61.amzn1.i686
postgresql92-plpython26-9.2.22-1.61.amzn1.i686
postgresql92-docs-9.2.22-1.61.amzn1.i686
postgresql92-libs-9.2.22-1.61.amzn1.i686
postgresql92-devel-9.2.22-1.61.amzn1.i686
postgresql92-pltcl-9.2.22-1.61.amzn1.i686
postgresql92-plperl-9.2.22-1.61.amzn1.i686
postgresql92-server-compat-9.2.22-1.61.amzn1.i686
postgresql92-test-9.2.22-1.61.amzn1.i686
src:
postgresql93-9.3.18-1.64.amzn1.src
postgresql92-9.2.22-1.61.amzn1.src
x86_64:
postgresql93-plpython26-9.3.18-1.64.amzn1.x86_64
postgresql93-pltcl-9.3.18-1.64.amzn1.x86_64
postgresql93-devel-9.3.18-1.64.amzn1.x86_64
postgresql93-libs-9.3.18-1.64.amzn1.x86_64
postgresql93-plpython27-9.3.18-1.64.amzn1.x86_64
postgresql93-plperl-9.3.18-1.64.amzn1.x86_64
postgresql93-contrib-9.3.18-1.64.amzn1.x86_64
postgresql93-9.3.18-1.64.amzn1.x86_64
postgresql93-server-9.3.18-1.64.amzn1.x86_64
postgresql93-debuginfo-9.3.18-1.64.amzn1.x86_64
postgresql93-test-9.3.18-1.64.amzn1.x86_64
postgresql93-docs-9.3.18-1.64.amzn1.x86_64
postgresql92-contrib-9.2.22-1.61.amzn1.x86_64
postgresql92-test-9.2.22-1.61.amzn1.x86_64
postgresql92-pltcl-9.2.22-1.61.amzn1.x86_64
postgresql92-libs-9.2.22-1.61.amzn1.x86_64
postgresql92-server-compat-9.2.22-1.61.amzn1.x86_64
postgresql92-server-9.2.22-1.61.amzn1.x86_64
postgresql92-plperl-9.2.22-1.61.amzn1.x86_64
postgresql92-9.2.22-1.61.amzn1.x86_64
postgresql92-devel-9.2.22-1.61.amzn1.x86_64
postgresql92-debuginfo-9.2.22-1.61.amzn1.x86_64
postgresql92-plpython26-9.2.22-1.61.amzn1.x86_64
postgresql92-docs-9.2.22-1.61.amzn1.x86_64
postgresql92-plpython27-9.2.22-1.61.amzn1.x86_64
Red Hat: CVE-2017-7546, CVE-2017-7547
Mitre: CVE-2017-7546, CVE-2017-7547
7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.28 Low
EPSS
Percentile
96.9%