Lucene search

K
gentooGentoo FoundationGLSA-200505-12
HistoryMay 15, 2005 - 12:00 a.m.

PostgreSQL: Multiple vulnerabilities

2005-05-1500:00:00
Gentoo Foundation
security.gentoo.org
20

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.005 Low

EPSS

Percentile

75.6%

Background

PostgreSQL is a SQL compliant, open source object-relational database management system.

Description

PostgreSQL gives public EXECUTE access to a number of character conversion routines, but doesn’t validate the given arguments (CAN-2005-1409). It has also been reported that the contrib/tsearch2 module of PostgreSQL misdeclares the return value of some functions as “internal” (CAN-2005-1410).

Impact

An attacker could call the character conversion routines with specially setup arguments to crash the backend process of PostgreSQL or to potentially gain administrator rights. A malicious user could also call the misdeclared functions of the contrib/tsearch2 module, resulting in a Denial of Service or other, yet uninvestigated, impacts.

Workaround

There is no known workaround at this time.

Resolution

All PostgreSQL users should update to the latest available version and follow the guide at http://www.postgresql.o rg/about/news.315

 # emerge --sync
 # emerge --ask --oneshot --verbose dev-db/postgresql
OSVersionArchitecturePackageVersionFilename
Gentooanyalldev-db/postgresql< 7.3.10UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.005 Low

EPSS

Percentile

75.6%