Lucene search

K
ibmIBMC6E57A9F1BC1435EFE414AA47744D73848E6CEAE0A71BD275E020B1BEF7CE51B
HistoryOct 21, 2020 - 1:03 a.m.

Security Bulletin: A security vulnerability in postgresql affects the IBM Cloud Pak for Multicloud Management Infrastructure Management Appliance

2020-10-2101:03:50
www.ibm.com
11

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

3.5 Low

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

Summary

A security vulnerability in postgresql affects the IBM Cloud Pak for Multicloud Management Infrastructure Management Appliance.

Vulnerability Details

Refer to the security bulletin(s) listed in the Remediation/Fixes section

Affected Products and Versions

Affected Product(s) Version(s)
IBM Cloud Pak for Multicloud Management 2.0

Remediation/Fixes

CVEID: CVE-2020-1720
DESCRIPTION: A flaw was found in PostgreSQL’s “ALTER … DEPENDS ON EXTENSION”, where sub-commands did not perform authorization checks. An authenticated attacker could use this flaw in certain configurations to perform drop objects such as function, triggers, et al., leading to database corruption. This issue affects PostgreSQL versions before 12.2, before 11.7, before 10.12 and before 9.6.17.
CVSS Base score: 3.5
CVSS Temporal Score: See: <https://exchange.xforce.ibmcloud.com/vulnerabilities/176286&gt; for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H)

IBM Cloud Pak for Multicloud Management Infrastructure Management Appliance version comes with an in built postgresql version 10.6. This vulnerability affects all postgresql before 10.12. To upgrade the version of postgresql in your appliance execute the following command

yum update postgresql

To restart the service and see the restart status run the following command

_
systemctl restart postgresql
systemctl status postgresql_

To verify the version of postgresql run the following command

postgresql -v

Workarounds and Mitigations

None

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

3.5 Low

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N