{"postgresql": [{"lastseen": "2018-02-15T15:10:41", "bulletinFamily": "software", "description": "Any database user is permitted to load arbitrary shared libraries using the LOAD command. A valid login is required to exploit this vulnerability.", "modified": "2005-05-02T00:00:00", "published": "2005-05-02T00:00:00", "href": "https://www.postgresql.org/support/security/8.0/", "id": "POSTGRESQL:CVE-2005-0227", "type": "postgresql", "title": "Vulnerability in core server (CVE-2005-0227)", "cvss": {"score": 4.3, "vector": "AV:LOCAL/AC:LOW/Au:SINGLE_INSTANCE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "nessus": [{"lastseen": "2019-02-21T01:08:39", "bulletinFamily": "scanner", "description": "John Heasman and others disovered that non-privileged users could use the LOAD extension to load arbitrary libraries into the postgres server process space. This could be used by non-privileged local users to execute arbitrary code with the privileges of the postgresql server.", "modified": "2018-12-19T00:00:00", "id": "FREEBSD_PKG_5D4251897A0311D9A9E70001020EED82.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=18949", "published": "2005-07-13T00:00:00", "title": "FreeBSD : postgresql -- privilege escalation vulnerability (5d425189-7a03-11d9-a9e7-0001020eed82)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(18949);\n script_version(\"1.19\");\n script_cvs_date(\"Date: 2018/12/19 13:21:17\");\n\n script_cve_id(\"CVE-2005-0227\");\n script_bugtraq_id(12411);\n\n script_name(english:\"FreeBSD : postgresql -- privilege escalation vulnerability (5d425189-7a03-11d9-a9e7-0001020eed82)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"John Heasman and others disovered that non-privileged users could use\nthe LOAD extension to load arbitrary libraries into the postgres\nserver process space. This could be used by non-privileged local users\nto execute arbitrary code with the privileges of the postgresql\nserver.\"\n );\n # http://archives.postgresql.org/pgsql-announce/2005-02/msg00000.php\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?416d0c25\"\n );\n # http://archives.postgresql.org/pgsql-bugs/2005-01/msg00269.php\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?b4709320\"\n );\n # https://vuxml.freebsd.org/freebsd/5d425189-7a03-11d9-a9e7-0001020eed82.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?59a12f54\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:S/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No exploit is required\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_cwe_id(94);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:ja-postgresql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:postgresql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:postgresql-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:postgresql-server\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2005/01/21\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/02/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/07/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"postgresql<7.3.9\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"postgresql>7.4.*<7.4.7\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"postgresql>8.*<8.0.1\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"postgresql-server<7.3.9\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"postgresql-server>7.4.*<7.4.7\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"postgresql-server>8.*<8.0.1\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"ja-postgresql<7.3.9\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"ja-postgresql>7.4.*<7.4.7\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"ja-postgresql>8.*<8.0.1\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"postgresql-devel<=8.0.1,1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.3, "vector": "AV:LOCAL/AC:LOW/Au:SINGLE_INSTANCE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-02-21T01:08:21", "bulletinFamily": "scanner", "description": "John Heasman and others discovered a bug in the PostgreSQL engine which would allow any user load an arbitrary local library into it.", "modified": "2018-08-09T00:00:00", "id": "DEBIAN_DSA-668.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=16342", "published": "2005-02-10T00:00:00", "title": "Debian DSA-668-1 : postgresql - privilege escalation", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 70103\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-668. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(16342);\n script_version(\"1.18\");\n script_cvs_date(\"Date: 2018/08/09 17:06:36\");\n\n script_cve_id(\"CVE-2005-0227\");\n script_xref(name:\"DSA\", value:\"668\");\n\n script_name(english:\"Debian DSA-668-1 : postgresql - privilege escalation\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"John Heasman and others discovered a bug in the PostgreSQL engine\nwhich would allow any user load an arbitrary local library into it.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=293125\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.debian.org/security/2005/dsa-668\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the postgresql packages.\n\nFor the stable distribution (woody) this problem has been fixed in\nversion 7.2.1-2woody7.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:S/C:P/I:P/A:P\");\n script_cwe_id(94);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:postgresql\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:3.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/02/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/02/10\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2005/01/31\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"3.0\", prefix:\"libecpg3\", reference:\"7.2.1-2woody7\")) flag++;\nif (deb_check(release:\"3.0\", prefix:\"libpgperl\", reference:\"7.2.1-2woody7\")) flag++;\nif (deb_check(release:\"3.0\", prefix:\"libpgsql2\", reference:\"7.2.1-2woody7\")) flag++;\nif (deb_check(release:\"3.0\", prefix:\"libpgtcl\", reference:\"7.2.1-2woody7\")) flag++;\nif (deb_check(release:\"3.0\", prefix:\"odbc-postgresql\", reference:\"7.2.1-2woody7\")) flag++;\nif (deb_check(release:\"3.0\", prefix:\"pgaccess\", reference:\"7.2.1-2woody7\")) flag++;\nif (deb_check(release:\"3.0\", prefix:\"postgresql\", reference:\"7.2.1-2woody7\")) flag++;\nif (deb_check(release:\"3.0\", prefix:\"postgresql-client\", reference:\"7.2.1-2woody7\")) flag++;\nif (deb_check(release:\"3.0\", prefix:\"postgresql-contrib\", reference:\"7.2.1-2woody7\")) flag++;\nif (deb_check(release:\"3.0\", prefix:\"postgresql-dev\", reference:\"7.2.1-2woody7\")) flag++;\nif (deb_check(release:\"3.0\", prefix:\"postgresql-doc\", reference:\"7.2.1-2woody7\")) flag++;\nif (deb_check(release:\"3.0\", prefix:\"python-pygresql\", reference:\"7.2.1-2woody7\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.3, "vector": "AV:LOCAL/AC:LOW/Au:SINGLE_INSTANCE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-02-21T01:08:24", "bulletinFamily": "scanner", "description": "Updated PostgreSQL packages to fix various security flaws are now available for Red Hat Enterprise Linux 2.1AS.\n\nThis update has been rated as having important security impact by the Red Hat Security Response Team.\n\nPostgreSQL is an advanced Object-Relational database management system (DBMS).\n\nA flaw in the LOAD command in PostgreSQL was discovered. A local user could use this flaw to load arbitrary shared libraries and therefore execute arbitrary code, gaining the privileges of the PostgreSQL server. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0227 to this issue.\n\nMultiple buffer overflows were found in PL/PgSQL. A database user who has permissions to create plpgsql functions could trigger this flaw which could lead to arbitrary code execution, gaining the privileges of the PostgreSQL server. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2005-0245 and CVE-2005-0247 to these issues.\n\nUsers of PostgreSQL are advised to update to these erratum packages which are not vulnerable to these issues.", "modified": "2018-11-15T00:00:00", "id": "REDHAT-RHSA-2005-150.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=17129", "published": "2005-02-16T00:00:00", "title": "RHEL 2.1 : postgresql (RHSA-2005:150)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2005:150. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(17129);\n script_version (\"1.21\");\n script_cvs_date(\"Date: 2018/11/15 11:40:29\");\n\n script_cve_id(\"CVE-2005-0227\", \"CVE-2005-0245\", \"CVE-2005-0247\");\n script_xref(name:\"RHSA\", value:\"2005:150\");\n\n script_name(english:\"RHEL 2.1 : postgresql (RHSA-2005:150)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated PostgreSQL packages to fix various security flaws are now\navailable for Red Hat Enterprise Linux 2.1AS.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nPostgreSQL is an advanced Object-Relational database management system\n(DBMS).\n\nA flaw in the LOAD command in PostgreSQL was discovered. A local user\ncould use this flaw to load arbitrary shared libraries and therefore\nexecute arbitrary code, gaining the privileges of the PostgreSQL\nserver. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CVE-2005-0227 to this issue.\n\nMultiple buffer overflows were found in PL/PgSQL. A database user who\nhas permissions to create plpgsql functions could trigger this flaw\nwhich could lead to arbitrary code execution, gaining the privileges\nof the PostgreSQL server. The Common Vulnerabilities and Exposures\nproject (cve.mitre.org) has assigned the names CVE-2005-0245 and\nCVE-2005-0247 to these issues.\n\nUsers of PostgreSQL are advised to update to these erratum packages\nwhich are not vulnerable to these issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-0227\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-0245\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-0247\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2005:150\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_cwe_id(94, 119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:postgresql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:postgresql-contrib\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:postgresql-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:postgresql-docs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:postgresql-jdbc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:postgresql-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:postgresql-odbc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:postgresql-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:postgresql-python\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:postgresql-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:postgresql-tcl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:postgresql-test\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:postgresql-tk\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:2.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/02/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/02/16\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = eregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^2\\.1([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 2.1\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\nif (cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i386\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2005:150\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"postgresql-7.1.3-6.rhel2.1AS\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"postgresql-contrib-7.1.3-6.rhel2.1AS\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"postgresql-devel-7.1.3-6.rhel2.1AS\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"postgresql-docs-7.1.3-6.rhel2.1AS\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"postgresql-jdbc-7.1.3-6.rhel2.1AS\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"postgresql-libs-7.1.3-6.rhel2.1AS\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"postgresql-odbc-7.1.3-6.rhel2.1AS\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"postgresql-perl-7.1.3-6.rhel2.1AS\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"postgresql-python-7.1.3-6.rhel2.1AS\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"postgresql-server-7.1.3-6.rhel2.1AS\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"postgresql-tcl-7.1.3-6.rhel2.1AS\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"postgresql-test-7.1.3-6.rhel2.1AS\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"postgresql-tk-7.1.3-6.rhel2.1AS\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"postgresql / postgresql-contrib / postgresql-devel / etc\");\n }\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-02-21T01:08:21", "bulletinFamily": "scanner", "description": "The remote PostgreSQL server, according to its version number, is vulnerable to multiple flaws that could allow an attacker who has the rights to query the remote database to obtain a shell on this host.", "modified": "2018-07-25T00:00:00", "id": "POSTGRESQL_MULTIPLE_FLAWS2.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=16309", "published": "2005-02-03T00:00:00", "title": "PostgreSQL < 7.2.7 / 7.3.9 / 7.4.7 / 8.0.1 Multiple Vulnerabilities", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(16309);\n script_version(\"1.17\");\n script_cvs_date(\"Date: 2018/07/25 18:58:03\");\n\n script_cve_id(\n \"CVE-2005-0227\",\n \"CVE-2005-0244\",\n \"CVE-2005-0245\",\n \"CVE-2005-0246\",\n \"CVE-2005-0247\"\n );\n script_bugtraq_id(12417, 12411);\n\n script_name(english:\"PostgreSQL < 7.2.7 / 7.3.9 / 7.4.7 / 8.0.1 Multiple Vulnerabilities\");\n script_summary(english:\"Attempts to log into the remote PostgreSQL daemon\");\n\n script_set_attribute(attribute:\"synopsis\", value:\"It may be possible to run arbitrary commands on the remote server.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote PostgreSQL server, according to its version number, is\nvulnerable to multiple flaws that could allow an attacker who has the\nrights to query the remote database to obtain a shell on this host.\");\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to postgresql 7.2.7, 7.3.9, 7.4.7, 8.0.1 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_cwe_id(94, 119, 264);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2005/01/31\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/02/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/02/03\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:postgresql:postgresql\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.\");\n script_family(english:\"Databases\");\n\n script_dependencies(\"postgresql_detect.nasl\");\n script_require_ports(\"Services/postgresql\", 5432);\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\nport = get_service(svc:\"postgresql\", default:5432, exit_on_fail:TRUE);\n\n#\n# Request the database 'template1' as the user 'postgres' or 'pgsql'\n#\nzero = raw_string(0x00);\n\nuser[0] = \"postgres\";\nuser[1] = \"pgsql\";\n\nfor(i=0;i<2;i=i+1)\n{\n soc = open_sock_tcp(port);\n if (!soc) audit(AUDIT_PORT_CLOSED, port);\n\n usr = user[i];\n len = 224 - strlen(usr);\n\n req = raw_string(0x00, 0x00, 0x01, 0x28, 0x00, 0x02,\n \t 0x00, 0x00, 0x74, 0x65, 0x6D, 0x70, 0x6C, 0x61,\n\t\t 0x74, 0x65, 0x31) + crap(data:zero, length:55) +\n usr +\n crap(data:zero, length:len);\n\n send(socket:soc, data:req);\n r = recv(socket:soc, length:5);\n r2 = recv(socket:soc, length:1024);\n if((r[0]==\"R\") && (strlen(r2) == 10))\n {\n dbs = \"\";\n req = raw_string(0x51) + \"select version();\" +\n \t raw_string(0x00);\n send(socket:soc, data:req);\n\n r = recv(socket:soc, length:65535);\n r = strstr(r, \"PostgreSQL\");\n if(r != NULL)\n {\n for(i=0;i<strlen(r);i++)\n {\n if(ord(r[i]) == 0) break;\n }\n r = substr(r, 0, i - 1);\n if (ereg(string:r, pattern:\"PostgreSQL ([0-6]\\.|7\\.2\\.[0-6][^0-9]|7\\.3\\.[0-8][^0-9]|7\\.4\\.[0-6][^0-9]|8\\.0\\.0[^0-9])\"))\n {\n \tsecurity_warning(port);\n exit(0);\n }\n }\n else if(\"ERROR: function version()\" >< r)\n {\n security_warning(port);\n exit(0);\n }\n audit(AUDIT_LISTEN_NOT_VULN, \"PostgreSQL\", port);\n }\n}\naudit(AUDIT_LISTEN_NOT_VULN, \"PostgreSQL\", port);\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-02-21T01:08:23", "bulletinFamily": "scanner", "description": "The remote host is affected by the vulnerability described in GLSA-200502-08 (PostgreSQL: Multiple vulnerabilities)\n\n PostgreSQL's contains several vulnerabilities:\n John Heasman discovered that the LOAD extension is vulnerable to local privilege escalation (CAN-2005-0227).\n It is possible to bypass the EXECUTE permission check for functions (CAN-2005-0244).\n The PL/PgSQL parser is vulnerable to heap-based buffer overflow (CAN-2005-0244).\n The intagg contrib module is vulnerable to a Denial of Service (CAN-2005-0246).\n Impact :\n\n An attacker could exploit this to execute arbitrary code with the privileges of the PostgreSQL server, bypass security restrictions and crash the server.\n Workaround :\n\n There is no know workaround at this time.", "modified": "2018-12-18T00:00:00", "id": "GENTOO_GLSA-200502-08.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=16445", "published": "2005-02-14T00:00:00", "title": "GLSA-200502-08 : PostgreSQL: Multiple vulnerabilities", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 200502-08.\n#\n# The advisory text is Copyright (C) 2001-2018 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(16445);\n script_version(\"1.17\");\n script_cvs_date(\"Date: 2018/12/18 10:18:58\");\n\n script_cve_id(\"CVE-2005-0227\", \"CVE-2005-0244\", \"CVE-2005-0245\", \"CVE-2005-0246\");\n script_xref(name:\"GLSA\", value:\"200502-08\");\n\n script_name(english:\"GLSA-200502-08 : PostgreSQL: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-200502-08\n(PostgreSQL: Multiple vulnerabilities)\n\n PostgreSQL's contains several vulnerabilities:\n John Heasman discovered that the LOAD extension is vulnerable to\n local privilege escalation (CAN-2005-0227).\n It is possible to bypass the EXECUTE permission check for functions\n (CAN-2005-0244).\n The PL/PgSQL parser is vulnerable to heap-based buffer overflow\n (CAN-2005-0244).\n The intagg contrib module is vulnerable to a Denial of Service\n (CAN-2005-0246).\n \nImpact :\n\n An attacker could exploit this to execute arbitrary code with the\n privileges of the PostgreSQL server, bypass security restrictions and\n crash the server.\n \nWorkaround :\n\n There is no know workaround at this time.\"\n );\n # http://archives.postgresql.org/pgsql-announce/2005-02/msg00000.php\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?416d0c25\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/200502-08\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All PostgreSQL users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose dev-db/postgresql\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_cwe_id(94, 264);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:postgresql\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/02/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/02/14\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"dev-db/postgresql\", unaffected:make_list(\"eq 7.3*\", \"eq 7.4*\", \"ge 8.0.1\"), vulnerable:make_list(\"lt 7.3.10\", \"lt 7.4.7\", \"lt 8.0.1\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"PostgreSQL\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-02-21T01:08:24", "bulletinFamily": "scanner", "description": "A number of vulnerabilities were found and corrected in the PostgreSQL DBMS :\n\nA flaw in the LOAD command could be abused by a local user to load arbitrary shared libraries and as a result execute arbitrary code with the privileges of the user running the postgresql server (CVE-2005-0227).\n\nA permission checking flaw was found where a local user could bypass the EXECUTE permission check for functions using the CREATE AGGREGATE command (CVE-2005-0244).\n\nMultiple buffer overflows were discovered in PL/PgSQL. A database user with permission to create plpgsql functions could trigger these flaws which could then lead to arbitrary code execution with the privileges of the user running the postgresql server (CVE-2005-0245 and CVE-2005-0247).\n\nFinally, a flaw in the integer aggregator (intagg) contrib module was found. A user could create carefully crafted arrays and crash the server, causing a Denial of Service (CVE-2005-0246).\n\nThe updated packages have been patched to correct these problems.", "modified": "2018-07-19T00:00:00", "id": "MANDRAKE_MDKSA-2005-040.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=17139", "published": "2005-02-18T00:00:00", "title": "Mandrake Linux Security Advisory : postgresql (MDKSA-2005:040)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 70103\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandrake Linux Security Advisory MDKSA-2005:040. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(17139);\n script_version (\"1.18\");\n script_cvs_date(\"Date: 2018/07/19 20:59:13\");\n\n script_cve_id(\"CVE-2005-0227\", \"CVE-2005-0244\", \"CVE-2005-0245\", \"CVE-2005-0246\", \"CVE-2005-0247\");\n script_xref(name:\"MDKSA\", value:\"2005:040\");\n\n script_name(english:\"Mandrake Linux Security Advisory : postgresql (MDKSA-2005:040)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandrake Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A number of vulnerabilities were found and corrected in the PostgreSQL\nDBMS :\n\nA flaw in the LOAD command could be abused by a local user to load\narbitrary shared libraries and as a result execute arbitrary code with\nthe privileges of the user running the postgresql server\n(CVE-2005-0227).\n\nA permission checking flaw was found where a local user could bypass\nthe EXECUTE permission check for functions using the CREATE AGGREGATE\ncommand (CVE-2005-0244).\n\nMultiple buffer overflows were discovered in PL/PgSQL. A database user\nwith permission to create plpgsql functions could trigger these flaws\nwhich could then lead to arbitrary code execution with the privileges\nof the user running the postgresql server (CVE-2005-0245 and\nCVE-2005-0247).\n\nFinally, a flaw in the integer aggregator (intagg) contrib module was\nfound. A user could create carefully crafted arrays and crash the\nserver, causing a Denial of Service (CVE-2005-0246).\n\nThe updated packages have been patched to correct these problems.\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_cwe_id(94, 119, 264);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64ecpg3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64ecpg3-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64pgtcl2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64pgtcl2-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64pq3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64pq3-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libecpg3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libecpg3-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libpgtcl2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libpgtcl2-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libpq3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libpq3-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:postgresql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:postgresql-contrib\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:postgresql-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:postgresql-docs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:postgresql-jdbc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:postgresql-pl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:postgresql-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:postgresql-tcl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:postgresql-test\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandrakesoft:mandrake_linux:10.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandrakesoft:mandrake_linux:10.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/02/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/02/18\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK10.0\", cpu:\"amd64\", reference:\"lib64ecpg3-7.4.1-2.3.100mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.0\", cpu:\"amd64\", reference:\"lib64ecpg3-devel-7.4.1-2.3.100mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.0\", cpu:\"amd64\", reference:\"lib64pgtcl2-7.4.1-2.3.100mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.0\", cpu:\"amd64\", reference:\"lib64pgtcl2-devel-7.4.1-2.3.100mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.0\", cpu:\"amd64\", reference:\"lib64pq3-7.4.1-2.3.100mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.0\", cpu:\"amd64\", reference:\"lib64pq3-devel-7.4.1-2.3.100mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.0\", cpu:\"i386\", reference:\"libecpg3-7.4.1-2.3.100mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.0\", cpu:\"i386\", reference:\"libecpg3-devel-7.4.1-2.3.100mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.0\", cpu:\"i386\", reference:\"libpgtcl2-7.4.1-2.3.100mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.0\", cpu:\"i386\", reference:\"libpgtcl2-devel-7.4.1-2.3.100mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.0\", cpu:\"i386\", reference:\"libpq3-7.4.1-2.3.100mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.0\", cpu:\"i386\", reference:\"libpq3-devel-7.4.1-2.3.100mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.0\", reference:\"postgresql-7.4.1-2.3.100mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.0\", reference:\"postgresql-contrib-7.4.1-2.3.100mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.0\", reference:\"postgresql-devel-7.4.1-2.3.100mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.0\", reference:\"postgresql-docs-7.4.1-2.3.100mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.0\", reference:\"postgresql-jdbc-7.4.1-2.3.100mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.0\", reference:\"postgresql-pl-7.4.1-2.3.100mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.0\", reference:\"postgresql-server-7.4.1-2.3.100mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.0\", reference:\"postgresql-tcl-7.4.1-2.3.100mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.0\", reference:\"postgresql-test-7.4.1-2.3.100mdk\", yank:\"mdk\")) flag++;\n\nif (rpm_check(release:\"MDK10.1\", cpu:\"x86_64\", reference:\"lib64ecpg3-7.4.5-4.2.101mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.1\", cpu:\"x86_64\", reference:\"lib64ecpg3-devel-7.4.5-4.2.101mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.1\", cpu:\"x86_64\", reference:\"lib64pgtcl2-7.4.5-4.2.101mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.1\", cpu:\"x86_64\", reference:\"lib64pgtcl2-devel-7.4.5-4.2.101mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.1\", cpu:\"x86_64\", reference:\"lib64pq3-7.4.5-4.2.101mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.1\", cpu:\"x86_64\", reference:\"lib64pq3-devel-7.4.5-4.2.101mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.1\", cpu:\"i386\", reference:\"libecpg3-7.4.5-4.2.101mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.1\", cpu:\"i386\", reference:\"libecpg3-devel-7.4.5-4.2.101mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.1\", cpu:\"i386\", reference:\"libpgtcl2-7.4.5-4.2.101mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.1\", cpu:\"i386\", reference:\"libpgtcl2-devel-7.4.5-4.2.101mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.1\", cpu:\"i386\", reference:\"libpq3-7.4.5-4.2.101mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.1\", cpu:\"i386\", reference:\"libpq3-devel-7.4.5-4.2.101mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.1\", reference:\"postgresql-7.4.5-4.2.101mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.1\", reference:\"postgresql-contrib-7.4.5-4.2.101mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.1\", reference:\"postgresql-devel-7.4.5-4.2.101mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.1\", reference:\"postgresql-docs-7.4.5-4.2.101mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.1\", reference:\"postgresql-jdbc-7.4.5-4.2.101mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.1\", reference:\"postgresql-pl-7.4.5-4.2.101mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.1\", reference:\"postgresql-server-7.4.5-4.2.101mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.1\", reference:\"postgresql-tcl-7.4.5-4.2.101mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.1\", reference:\"postgresql-test-7.4.5-4.2.101mdk\", yank:\"mdk\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-02-21T01:08:25", "bulletinFamily": "scanner", "description": "Updated postresql packages that correct various security issues are now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having important security impact by the Red Hat Security Response Team.\n\nA flaw in the LOAD command in PostgreSQL was discovered. A local user could use this flaw to load arbitrary shared libraries and therefore execute arbitrary code, gaining the privileges of the PostgreSQL server. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0227 to this issue.\n\nA permission checking flaw in PostgreSQL was discovered. A local user could bypass the EXECUTE permission check for functions by using the CREATE AGGREGATE command. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0244 to this issue.\n\nMultiple buffer overflows were found in PL/PgSQL. A database user who has permissions to create plpgsql functions could trigger this flaw which could lead to arbitrary code execution, gaining the privileges of the PostgreSQL server. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2005-0245 and CVE-2005-0247 to these issues.\n\nA flaw in the integer aggregator (intagg) contrib module for PostgreSQL was found. A user could create carefully crafted arrays and cause a denial of service (crash). The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0246 to this issue.\n\nThe update also fixes some minor problems, notably conflicts with SELinux.\n\nUsers of postgresql should update to these erratum packages that contain patches and are not vulnerable to these issues.", "modified": "2018-11-15T00:00:00", "id": "REDHAT-RHSA-2005-138.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=17192", "published": "2005-02-22T00:00:00", "title": "RHEL 4 : postgresql (RHSA-2005:138)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2005:138. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(17192);\n script_version (\"1.21\");\n script_cvs_date(\"Date: 2018/11/15 11:40:29\");\n\n script_cve_id(\"CVE-2005-0227\", \"CVE-2005-0244\", \"CVE-2005-0245\", \"CVE-2005-0246\", \"CVE-2005-0247\");\n script_xref(name:\"RHSA\", value:\"2005:138\");\n\n script_name(english:\"RHEL 4 : postgresql (RHSA-2005:138)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated postresql packages that correct various security issues are\nnow available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nA flaw in the LOAD command in PostgreSQL was discovered. A local user\ncould use this flaw to load arbitrary shared libraries and therefore\nexecute arbitrary code, gaining the privileges of the PostgreSQL\nserver. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CVE-2005-0227 to this issue.\n\nA permission checking flaw in PostgreSQL was discovered. A local user\ncould bypass the EXECUTE permission check for functions by using the\nCREATE AGGREGATE command. The Common Vulnerabilities and Exposures\nproject (cve.mitre.org) has assigned the name CVE-2005-0244 to this\nissue.\n\nMultiple buffer overflows were found in PL/PgSQL. A database user who\nhas permissions to create plpgsql functions could trigger this flaw\nwhich could lead to arbitrary code execution, gaining the privileges\nof the PostgreSQL server. The Common Vulnerabilities and Exposures\nproject (cve.mitre.org) has assigned the names CVE-2005-0245 and\nCVE-2005-0247 to these issues.\n\nA flaw in the integer aggregator (intagg) contrib module for\nPostgreSQL was found. A user could create carefully crafted arrays and\ncause a denial of service (crash). The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the name CVE-2005-0246\nto this issue.\n\nThe update also fixes some minor problems, notably conflicts with\nSELinux.\n\nUsers of postgresql should update to these erratum packages that\ncontain patches and are not vulnerable to these issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-0227\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-0244\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-0245\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-0246\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-0247\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2005:138\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_cwe_id(94, 119, 264);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:postgresql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:postgresql-contrib\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:postgresql-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:postgresql-docs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:postgresql-jdbc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:postgresql-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:postgresql-pl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:postgresql-python\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:postgresql-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:postgresql-tcl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:postgresql-test\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:4\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/02/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/02/22\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = eregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 4.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2005:138\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL4\", reference:\"postgresql-7.4.7-2.RHEL4.1\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"postgresql-contrib-7.4.7-2.RHEL4.1\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"postgresql-devel-7.4.7-2.RHEL4.1\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"postgresql-docs-7.4.7-2.RHEL4.1\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"postgresql-jdbc-7.4.7-2.RHEL4.1\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"postgresql-libs-7.4.7-2.RHEL4.1\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"postgresql-pl-7.4.7-2.RHEL4.1\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"postgresql-python-7.4.7-2.RHEL4.1\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"postgresql-server-7.4.7-2.RHEL4.1\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"postgresql-tcl-7.4.7-2.RHEL4.1\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"postgresql-test-7.4.7-2.RHEL4.1\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"postgresql / postgresql-contrib / postgresql-devel / etc\");\n }\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-02-21T01:08:22", "bulletinFamily": "scanner", "description": "Updated PostgreSQL packages to fix various security flaws are now available for Red Hat Enterprise Linux 3.\n\nPostgreSQL is an advanced Object-Relational database management system (DBMS).\n\nA flaw in the LOAD command in PostgreSQL was discovered. A local user could use this flaw to load arbitrary shared librarys and therefore execute arbitrary code, gaining the privileges of the PostgreSQL server. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0227 to this issue.\n\nA permission checking flaw in PostgreSQL was discovered. A local user could bypass the EXECUTE permission check for functions by using the CREATE AGGREGATE command. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0244 to this issue.\n\nMultiple buffer overflows were found in PL/PgSQL. A database user who has permissions to create plpgsql functions could trigger this flaw which could lead to arbitrary code execution, gaining the privileges of the PostgreSQL server. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2005-0245 and CVE-2005-0247 to these issues.\n\nA flaw in the integer aggregator (intagg) contrib module for PostgreSQL was found. A user could create carefully crafted arrays and cause a denial of service (crash). The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0246 to this issue.\n\nUsers of PostgreSQL are advised to update to these erratum packages which are not vulnerable to these issues.", "modified": "2018-11-15T00:00:00", "id": "REDHAT-RHSA-2005-141.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=16386", "published": "2005-02-14T00:00:00", "title": "RHEL 3 : rh-postgresql (RHSA-2005:141)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2005:141. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(16386);\n script_version (\"1.23\");\n script_cvs_date(\"Date: 2018/11/15 11:40:29\");\n\n script_cve_id(\"CVE-2005-0227\", \"CVE-2005-0244\", \"CVE-2005-0245\", \"CVE-2005-0246\", \"CVE-2005-0247\");\n script_xref(name:\"RHSA\", value:\"2005:141\");\n\n script_name(english:\"RHEL 3 : rh-postgresql (RHSA-2005:141)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated PostgreSQL packages to fix various security flaws are now\navailable for Red Hat Enterprise Linux 3.\n\nPostgreSQL is an advanced Object-Relational database management system\n(DBMS).\n\nA flaw in the LOAD command in PostgreSQL was discovered. A local user\ncould use this flaw to load arbitrary shared librarys and therefore\nexecute arbitrary code, gaining the privileges of the PostgreSQL\nserver. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CVE-2005-0227 to this issue.\n\nA permission checking flaw in PostgreSQL was discovered. A local user\ncould bypass the EXECUTE permission check for functions by using the\nCREATE AGGREGATE command. The Common Vulnerabilities and Exposures\nproject (cve.mitre.org) has assigned the name CVE-2005-0244 to this\nissue.\n\nMultiple buffer overflows were found in PL/PgSQL. A database user who\nhas permissions to create plpgsql functions could trigger this flaw\nwhich could lead to arbitrary code execution, gaining the privileges\nof the PostgreSQL server. The Common Vulnerabilities and Exposures\nproject (cve.mitre.org) has assigned the names CVE-2005-0245 and\nCVE-2005-0247 to these issues.\n\nA flaw in the integer aggregator (intagg) contrib module for\nPostgreSQL was found. A user could create carefully crafted arrays and\ncause a denial of service (crash). The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the name CVE-2005-0246\nto this issue.\n\nUsers of PostgreSQL are advised to update to these erratum packages\nwhich are not vulnerable to these issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-0227\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-0244\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-0245\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-0246\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-0247\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2005:141\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_cwe_id(94, 119, 264);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rh-postgresql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rh-postgresql-contrib\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rh-postgresql-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rh-postgresql-docs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rh-postgresql-jdbc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rh-postgresql-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rh-postgresql-pl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rh-postgresql-python\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rh-postgresql-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rh-postgresql-tcl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rh-postgresql-test\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:3\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/02/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/02/14\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = eregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^3([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 3.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2005:141\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL3\", reference:\"rh-postgresql-7.3.9-2\")) flag++;\n if (rpm_check(release:\"RHEL3\", reference:\"rh-postgresql-contrib-7.3.9-2\")) flag++;\n if (rpm_check(release:\"RHEL3\", reference:\"rh-postgresql-devel-7.3.9-2\")) flag++;\n if (rpm_check(release:\"RHEL3\", reference:\"rh-postgresql-docs-7.3.9-2\")) flag++;\n if (rpm_check(release:\"RHEL3\", reference:\"rh-postgresql-jdbc-7.3.9-2\")) flag++;\n if (rpm_check(release:\"RHEL3\", reference:\"rh-postgresql-libs-7.3.9-2\")) flag++;\n if (rpm_check(release:\"RHEL3\", reference:\"rh-postgresql-pl-7.3.9-2\")) flag++;\n if (rpm_check(release:\"RHEL3\", reference:\"rh-postgresql-python-7.3.9-2\")) flag++;\n if (rpm_check(release:\"RHEL3\", reference:\"rh-postgresql-server-7.3.9-2\")) flag++;\n if (rpm_check(release:\"RHEL3\", reference:\"rh-postgresql-tcl-7.3.9-2\")) flag++;\n if (rpm_check(release:\"RHEL3\", reference:\"rh-postgresql-test-7.3.9-2\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"rh-postgresql / rh-postgresql-contrib / rh-postgresql-devel / etc\");\n }\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "freebsd": [{"lastseen": "2018-08-31T01:16:02", "bulletinFamily": "unix", "description": "\nJohn Heasman and others disovered that non-privileged users\n\t could use the LOAD extension to load arbitrary\n\t libraries into the postgres server process space. This\n\t could be used by non-privileged local users to execute\n\t arbitrary code with the privileges of the postgresql\n\t server.\n", "modified": "2005-01-21T00:00:00", "published": "2005-01-21T00:00:00", "id": "5D425189-7A03-11D9-A9E7-0001020EED82", "href": "https://vuxml.freebsd.org/freebsd/5d425189-7a03-11d9-a9e7-0001020eed82.html", "title": "postgresql -- privilege escalation vulnerability", "type": "freebsd", "cvss": {"score": 4.3, "vector": "AV:LOCAL/AC:LOW/Au:SINGLE_INSTANCE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "osvdb": [{"lastseen": "2017-04-28T13:20:09", "bulletinFamily": "software", "description": "## Solution Description\nUpgrade to version 8.0.1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## References:\nVendor URL: http://www.postgresql.org/\n[Vendor Specific Advisory URL](http://rhn.redhat.com/errata/RHSA-2005-141.html)\n[Vendor Specific Advisory URL](http://www.ubuntulinux.org/support/documentation/usn/usn-71-1)\n[Vendor Specific Advisory URL](http://www.debian.org/security/2005/dsa-668)\n[Secunia Advisory ID:14320](https://secuniaresearch.flexerasoftware.com/advisories/14320/)\n[Secunia Advisory ID:14352](https://secuniaresearch.flexerasoftware.com/advisories/14352/)\n[Secunia Advisory ID:12948](https://secuniaresearch.flexerasoftware.com/advisories/12948/)\n[Secunia Advisory ID:14171](https://secuniaresearch.flexerasoftware.com/advisories/14171/)\n[Secunia Advisory ID:14024](https://secuniaresearch.flexerasoftware.com/advisories/14024/)\n[Secunia Advisory ID:14184](https://secuniaresearch.flexerasoftware.com/advisories/14184/)\n[Related OSVDB ID: 13355](https://vulners.com/osvdb/OSVDB:13355)\n[Related OSVDB ID: 13356](https://vulners.com/osvdb/OSVDB:13356)\n[Related OSVDB ID: 13357](https://vulners.com/osvdb/OSVDB:13357)\nOther Advisory URL: http://archives.postgresql.org/pgsql-announce/2005-02/msg00000.php\nOther Advisory URL: http://www.mandrakesoft.com/security/advisories?name=MDKSA-2005:040\nOther Advisory URL: http://security.gentoo.org/glsa/glsa-200502-08.xml\n[CVE-2005-0227](https://vulners.com/cve/CVE-2005-0227)\n", "modified": "2005-01-31T07:48:50", "published": "2005-01-31T07:48:50", "id": "OSVDB:13354", "href": "https://vulners.com/osvdb/OSVDB:13354", "title": "PostgreSQL LOAD Arbitrary Command Execution", "type": "osvdb", "cvss": {"score": 4.3, "vector": "AV:LOCAL/AC:LOW/Au:SINGLE_INSTANCE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "openvas": [{"lastseen": "2017-07-02T21:10:12", "bulletinFamily": "scanner", "description": "The remote host is missing an update to the system\nas announced in the referenced advisory.", "modified": "2016-09-28T00:00:00", "published": "2008-09-04T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=52194", "id": "OPENVAS:52194", "title": "FreeBSD Ports: postgresql, postgresql-server, ja-postgresql", "type": "openvas", "sourceData": "#\n#VID 5d425189-7a03-11d9-a9e7-0001020eed82\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from vuxml or freebsd advisories\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The following packages are affected:\n postgresql\n postgresql-server\n ja-postgresql\n postgresql-devel\n\nCVE-2005-0227\nPostgreSQL (pgsql) 7.4.x, 7.2.x, and other versions allows local users\nto load arbitrary shared libraries and execute code via the LOAD\nextension.\";\ntag_solution = \"Update your system with the appropriate patches or\nsoftware upgrades.\n\nhttp://archives.postgresql.org/pgsql-announce/2005-02/msg00000.php\nhttp://archives.postgresql.org/pgsql-bugs/2005-01/msg00269.php\nhttp://www.vuxml.org/freebsd/5d425189-7a03-11d9-a9e7-0001020eed82.html\";\ntag_summary = \"The remote host is missing an update to the system\nas announced in the referenced advisory.\";\n\n\nif(description)\n{\n script_id(52194);\n script_version(\"$Revision: 4164 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2016-09-28 09:03:16 +0200 (Wed, 28 Sep 2016) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)\");\n script_cve_id(\"CVE-2005-0227\");\n script_bugtraq_id(12411);\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:S/C:P/I:P/A:P\");\n script_name(\"FreeBSD Ports: postgresql, postgresql-server, ja-postgresql\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"FreeBSD Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/freebsdrel\", \"login/SSH/success\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-bsd.inc\");\n\ntxt = \"\";\nvuln = 0;\nbver = portver(pkg:\"postgresql\");\nif(!isnull(bver) && revcomp(a:bver, b:\"7.3.9\")<0) {\n txt += 'Package postgresql version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nif(!isnull(bver) && revcomp(a:bver, b:\"7.4\")>0 && revcomp(a:bver, b:\"7.4.7\")<0) {\n txt += 'Package postgresql version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nif(!isnull(bver) && revcomp(a:bver, b:\"8\")>0 && revcomp(a:bver, b:\"8.0.1\")<0) {\n txt += 'Package postgresql version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"postgresql-server\");\nif(!isnull(bver) && revcomp(a:bver, b:\"7.3.9\")<0) {\n txt += 'Package postgresql-server version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nif(!isnull(bver) && revcomp(a:bver, b:\"7.4\")>0 && revcomp(a:bver, b:\"7.4.7\")<0) {\n txt += 'Package postgresql-server version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nif(!isnull(bver) && revcomp(a:bver, b:\"8\")>0 && revcomp(a:bver, b:\"8.0.1\")<0) {\n txt += 'Package postgresql-server version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"ja-postgresql\");\nif(!isnull(bver) && revcomp(a:bver, b:\"7.3.9\")<0) {\n txt += 'Package ja-postgresql version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nif(!isnull(bver) && revcomp(a:bver, b:\"7.4\")>0 && revcomp(a:bver, b:\"7.4.7\")<0) {\n txt += 'Package ja-postgresql version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nif(!isnull(bver) && revcomp(a:bver, b:\"8\")>0 && revcomp(a:bver, b:\"8.0.1\")<0) {\n txt += 'Package ja-postgresql version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"postgresql-devel\");\nif(!isnull(bver) && revcomp(a:bver, b:\"8.0.1,1\")<=0) {\n txt += 'Package postgresql-devel version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\n\nif(vuln) {\n security_message(data:string(txt));\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 4.3, "vector": "AV:LOCAL/AC:LOW/Au:SINGLE_INSTANCE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-24T12:50:05", "bulletinFamily": "scanner", "description": "The remote host is missing updates announced in\nadvisory GLSA 200502-08.", "modified": "2017-07-07T00:00:00", "published": "2008-09-24T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=54840", "id": "OPENVAS:54840", "title": "Gentoo Security Advisory GLSA 200502-08 (postgresql)", "type": "openvas", "sourceData": "# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"PostgreSQL contains several vulnerabilities which could lead to execution\nof arbitrary code, Denial of Service and security bypass.\";\ntag_solution = \"All PostgreSQL users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=dev-db/postgresql-7.4.7'\n\nhttp://www.securityspace.com/smysecure/catid.html?in=GLSA%20200502-08\nhttp://bugs.gentoo.org/show_bug.cgi?id=80342\nhttp://archives.postgresql.org/pgsql-announce/2005-02/msg00000.php\";\ntag_summary = \"The remote host is missing updates announced in\nadvisory GLSA 200502-08.\";\n\n \n\nif(description)\n{\n script_id(54840);\n script_version(\"$Revision: 6596 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 11:21:37 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)\");\n script_cve_id(\"CVE-2005-0227\", \"CVE-2005-0244\", \"CVE-2005-0245\", \"CVE-2005-0246\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"Gentoo Security Advisory GLSA 200502-08 (postgresql)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = ispkgvuln(pkg:\"dev-db/postgresql\", unaffected: make_list(\"rge 7.4.7\", \"ge 8.0.1\"), vulnerable: make_list(\"lt 8.0.1\"))) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-26T08:56:15", "bulletinFamily": "scanner", "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n postgresql-devel\n postgresql-docs\n postgresql-pl\n postgresql-libs\n postgresql-server\n postgresql\n postgresql-contrib\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5013194 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/", "modified": "2017-07-11T00:00:00", "published": "2009-10-10T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=65093", "id": "OPENVAS:65093", "title": "SLES9: Security update for postgresql", "type": "openvas", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: sles9p5013194.nasl 6666 2017-07-11 13:13:36Z cfischer $\n# Description: Security update for postgresql\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n postgresql-devel\n postgresql-docs\n postgresql-pl\n postgresql-libs\n postgresql-server\n postgresql\n postgresql-contrib\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5013194 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n \nif(description)\n{\n script_id(65093);\n script_version(\"$Revision: 6666 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-11 15:13:36 +0200 (Tue, 11 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)\");\n script_cve_id(\"CVE-2005-0227\", \"CVE-2005-0244\", \"CVE-2005-0245\", \"CVE-2005-0246\", \"CVE-2005-0247\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"SLES9: Security update for postgresql\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"postgresql-devel\", rpm:\"postgresql-devel~7.4.7~0.5\", rls:\"SLES9.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-04-06T11:40:23", "bulletinFamily": "scanner", "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n postgresql-devel\n postgresql-docs\n postgresql-pl\n postgresql-libs\n postgresql-server\n postgresql\n postgresql-contrib\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5013194 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/", "modified": "2018-04-06T00:00:00", "published": "2009-10-10T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231065093", "id": "OPENVAS:136141256231065093", "type": "openvas", "title": "SLES9: Security update for postgresql", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: sles9p5013194.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Security update for postgresql\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n postgresql-devel\n postgresql-docs\n postgresql-pl\n postgresql-libs\n postgresql-server\n postgresql\n postgresql-contrib\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5013194 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n \nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.65093\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)\");\n script_cve_id(\"CVE-2005-0227\", \"CVE-2005-0244\", \"CVE-2005-0245\", \"CVE-2005-0246\", \"CVE-2005-0247\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"SLES9: Security update for postgresql\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"postgresql-devel\", rpm:\"postgresql-devel~7.4.7~0.5\", rls:\"SLES9.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-26T08:55:38", "bulletinFamily": "scanner", "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n postgresql-libs\n postgresql-pl\n postgresql-devel\n postgresql-docs\n postgresql\n postgresql-server\n postgresql-contrib\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5010972 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/", "modified": "2017-07-11T00:00:00", "published": "2009-10-10T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=65135", "id": "OPENVAS:65135", "title": "SLES9: Security update for PostgreSQL", "type": "openvas", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: sles9p5010972.nasl 6666 2017-07-11 13:13:36Z cfischer $\n# Description: Security update for PostgreSQL\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n postgresql-libs\n postgresql-pl\n postgresql-devel\n postgresql-docs\n postgresql\n postgresql-server\n postgresql-contrib\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5010972 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n \nif(description)\n{\n script_id(65135);\n script_version(\"$Revision: 6666 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-11 15:13:36 +0200 (Tue, 11 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)\");\n script_cve_id(\"CVE-2005-0227\", \"CVE-2005-0244\", \"CVE-2005-0245\", \"CVE-2005-0246\", \"CVE-2005-0247\", \"CVE-2005-1409\", \"CVE-2005-1410\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"SLES9: Security update for PostgreSQL\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"postgresql-libs\", rpm:\"postgresql-libs~7.4.8~0.6\", rls:\"SLES9.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-04-06T11:38:29", "bulletinFamily": "scanner", "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n postgresql-libs\n postgresql-pl\n postgresql-devel\n postgresql-docs\n postgresql\n postgresql-server\n postgresql-contrib\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5010972 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/", "modified": "2018-04-06T00:00:00", "published": "2009-10-10T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231065135", "id": "OPENVAS:136141256231065135", "title": "SLES9: Security update for PostgreSQL", "type": "openvas", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: sles9p5010972.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Security update for PostgreSQL\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n postgresql-libs\n postgresql-pl\n postgresql-devel\n postgresql-docs\n postgresql\n postgresql-server\n postgresql-contrib\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5010972 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n \nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.65135\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)\");\n script_cve_id(\"CVE-2005-0227\", \"CVE-2005-0244\", \"CVE-2005-0245\", \"CVE-2005-0246\", \"CVE-2005-0247\", \"CVE-2005-1409\", \"CVE-2005-1410\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"SLES9: Security update for PostgreSQL\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"postgresql-libs\", rpm:\"postgresql-libs~7.4.8~0.6\", rls:\"SLES9.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "redhat": [{"lastseen": "2018-12-11T17:42:05", "bulletinFamily": "unix", "description": "PostgreSQL is an advanced Object-Relational database management system\n(DBMS).\n\nA flaw in the LOAD command in PostgreSQL was discovered. A local user\ncould use this flaw to load arbitrary shared libraries and therefore\nexecute arbitrary code, gaining the privileges of the PostgreSQL server. \nThe Common Vulnerabilities and Exposures project (cve.mitre.org) has\nassigned the name CAN-2005-0227 to this issue.\n\nMultiple buffer overflows were found in PL/PgSQL. A database user who has\npermissions to create plpgsql functions could trigger this flaw which could\nlead to arbitrary code execution, gaining the privileges of the PostgreSQL\nserver. The Common Vulnerabilities and Exposures project (cve.mitre.org)\nhas assigned the names CAN-2005-0245 and CAN-2005-0247 to these issues.\n\nUsers of PostgreSQL are advised to update to these erratum packages which\nare not vulnerable to these issues.", "modified": "2018-03-14T19:26:32", "published": "2005-02-16T05:00:00", "id": "RHSA-2005:150", "href": "https://access.redhat.com/errata/RHSA-2005:150", "type": "redhat", "title": "(RHSA-2005:150) postgresql security update", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-12-11T17:41:56", "bulletinFamily": "unix", "description": "PostgreSQL is an advanced Object-Relational database management system\n(DBMS).\n\nA flaw in the LOAD command in PostgreSQL was discovered. A local user\ncould use this flaw to load arbitrary shared librarys and therefore execute\narbitrary code, gaining the privileges of the PostgreSQL server. The\nCommon Vulnerabilities and Exposures project (cve.mitre.org) has assigned\nthe name CAN-2005-0227 to this issue.\n\nA permission checking flaw in PostgreSQL was discovered. A local user\ncould bypass the EXECUTE permission check for functions by using the CREATE\nAGGREGATE command. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2005-0244 to this issue.\n\nMultiple buffer overflows were found in PL/PgSQL. A database user who has\npermissions to create plpgsql functions could trigger this flaw which could\nlead to arbitrary code execution, gaining the privileges of the PostgreSQL\nserver. The Common Vulnerabilities and Exposures project (cve.mitre.org)\nhas assigned the names CAN-2005-0245 and CAN-2005-0247 to these issues.\n\nA flaw in the integer aggregator (intagg) contrib module for PostgreSQL was\nfound. A user could create carefully crafted arrays and cause a denial of\nservice (crash). The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2005-0246 to this issue.\n\nUsers of PostgreSQL are advised to update to these erratum packages which\nare not vulnerable to these issues.", "modified": "2017-07-29T20:29:14", "published": "2005-02-14T05:00:00", "id": "RHSA-2005:141", "href": "https://access.redhat.com/errata/RHSA-2005:141", "type": "redhat", "title": "(RHSA-2005:141) rh-postgresql security update", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-12-11T17:41:34", "bulletinFamily": "unix", "description": "A flaw in the LOAD command in PostgreSQL was discovered. A local user\ncould use this flaw to load arbitrary shared libraries and therefore\nexecute arbitrary code, gaining the privileges of the PostgreSQL server.\nThe Common Vulnerabilities and Exposures project (cve.mitre.org) has\nassigned the name CAN-2005-0227 to this issue.\n\nA permission checking flaw in PostgreSQL was discovered. A local user\ncould bypass the EXECUTE permission check for functions by using the CREATE\nAGGREGATE command. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2005-0244 to this issue.\n\nMultiple buffer overflows were found in PL/PgSQL. A database user who has\npermissions to create plpgsql functions could trigger this flaw which could\nlead to arbitrary code execution, gaining the privileges of the PostgreSQL\nserver. The Common Vulnerabilities and Exposures project (cve.mitre.org)\nhas assigned the names CAN-2005-0245 and CAN-2005-0247 to these issues.\n\nA flaw in the integer aggregator (intagg) contrib module for PostgreSQL was\nfound. A user could create carefully crafted arrays and cause a denial of\nservice (crash). The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2005-0246 to this issue.\n\nThe update also fixes some minor problems, notably conflicts with SELinux.\n\nUsers of postgresql should update to these erratum packages that contain\npatches and are not vulnerable to these issues.", "modified": "2017-09-08T12:12:11", "published": "2005-02-15T05:00:00", "id": "RHSA-2005:138", "href": "https://access.redhat.com/errata/RHSA-2005:138", "type": "redhat", "title": "(RHSA-2005:138) postgresql security update", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "gentoo": [{"lastseen": "2016-09-06T19:46:18", "bulletinFamily": "unix", "description": "### Background\n\nPostgreSQL is a SQL compliant, open source object-relational database management system. \n\n### Description\n\nPostgreSQL's contains several vulnerabilities: \n\n * John Heasman discovered that the LOAD extension is vulnerable to local privilege escalation (CAN-2005-0227).\n * It is possible to bypass the EXECUTE permission check for functions (CAN-2005-0244).\n * The PL/PgSQL parser is vulnerable to heap-based buffer overflow (CAN-2005-0244).\n * The intagg contrib module is vulnerable to a Denial of Service (CAN-2005-0246).\n\n### Impact\n\nAn attacker could exploit this to execute arbitrary code with the privileges of the PostgreSQL server, bypass security restrictions and crash the server. \n\n### Workaround\n\nThere is no know workaround at this time. \n\n### Resolution\n\nAll PostgreSQL users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose dev-db/postgresql", "modified": "2007-06-26T00:00:00", "published": "2005-02-07T00:00:00", "id": "GLSA-200502-08", "href": "https://security.gentoo.org/glsa/200502-08", "type": "gentoo", "title": "PostgreSQL: Multiple vulnerabilities", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "suse": [{"lastseen": "2016-09-04T11:55:38", "bulletinFamily": "unix", "description": "Sudo(8) allows the execution of commands as another user and gives the administrator more flexibility than su(1). A race condition in the pathname handling of sudo may allow a local user to execute arbitrary commands. To exploit this bug some conditions need to be fulfilled. The attacking user needs to be listed in the sudoers file, he is able to create symbolic links in the filesystem, and a ALL alias- command needs to follow the attackers entry.\n#### Solution\nIt is recommended to install the updated packages.", "modified": "2005-06-24T12:44:43", "published": "2005-06-24T12:44:43", "id": "SUSE-SA:2005:036", "href": "http://lists.opensuse.org/opensuse-security-announce/2005-06/msg00024.html", "title": "race condition, arbitrary code execution in sudo", "type": "suse", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}]}