6.5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.6 High
AI Score
Confidence
High
0.004 Low
EPSS
Percentile
73.3%
Package : postgresql-9.4
Version : 9.4.24-0+deb8u1
CVE ID : CVE-2019-10208
TYPE
in pg_temp
executes arbitrary SQL duringSECURITY DEFINER
executionVersions Affected: 9.4 - 11
Given a suitable SECURITY DEFINER
function, an attacker can execute
arbitrary SQL under the identity of the function owner. An attack
requires EXECUTE
permission on the function, which must itself contain
a function call having inexact argument type match. For example,
length('foo'::varchar)
and length('foo')
are inexact, while
length('foo'::text)
is exact. As part of exploiting this
vulnerability, the attacker uses CREATE DOMAIN
to create a type in a
pg_temp
schema. The attack pattern and fix are similar to that for
CVE-2007-2138.
Writing SECURITY DEFINER
functions continues to require following the
considerations noted in the documentation:
https://www.postgresql.org/docs/devel/sql-createfunction.html#SQL-CREATEFUNCTION-SECURITY
The PostgreSQL project thanks Tom Lane for reporting this problem.
For Debian 8 "Jessie", this problem has been fixed in version
9.4.24-0+deb8u1.
We recommend that you upgrade your postgresql-9.4 packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: PGP signature
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 9 | i386 | postgresql-pltcl-9.6 | < 9.6.15-0+deb9u1 | postgresql-pltcl-9.6_9.6.15-0+deb9u1_i386.deb |
Debian | 9 | amd64 | postgresql-plperl-9.6 | < 9.6.15-0+deb9u1 | postgresql-plperl-9.6_9.6.15-0+deb9u1_amd64.deb |
Debian | 10 | arm64 | postgresql-11-dbgsym | < 11.5-1+deb10u1 | postgresql-11-dbgsym_11.5-1+deb10u1_arm64.deb |
Debian | 10 | armhf | postgresql-client-11-dbgsym | < 11.5-1+deb10u1 | postgresql-client-11-dbgsym_11.5-1+deb10u1_armhf.deb |
Debian | 9 | mipsel | libecpg-dev | < 9.6.15-0+deb9u1 | libecpg-dev_9.6.15-0+deb9u1_mipsel.deb |
Debian | 9 | amd64 | libecpg6 | < 9.6.15-0+deb9u1 | libecpg6_9.6.15-0+deb9u1_amd64.deb |
Debian | 10 | mipsel | libpq5-dbgsym | < 11.5-1+deb10u1 | libpq5-dbgsym_11.5-1+deb10u1_mipsel.deb |
Debian | 9 | armhf | postgresql-9.6 | < 9.6.15-0+deb9u1 | postgresql-9.6_9.6.15-0+deb9u1_armhf.deb |
Debian | 8 | all | postgresql-doc-9.4 | < 9.4.24-0+deb8u1 | postgresql-doc-9.4_9.4.24-0+deb8u1_all.deb |
Debian | 9 | amd64 | libpq5 | < 9.6.15-0+deb9u1 | libpq5_9.6.15-0+deb9u1_amd64.deb |
6.5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.6 High
AI Score
Confidence
High
0.004 Low
EPSS
Percentile
73.3%