Lucene search

K
openvasCopyright (C) 2014 Greenbone AGOPENVAS:1361412562310804710
HistoryJul 07, 2014 - 12:00 a.m.

PostgreSQL Multiple Security Bypass Vulnerability (Jul 2014) - Windows

2014-07-0700:00:00
Copyright (C) 2014 Greenbone AG
plugins.openvas.org
25

9.7 High

AI Score

Confidence

High

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.927 High

EPSS

Percentile

99.0%

PostgreSQL is prone to multiple security bypass vulnerabilities.

# SPDX-FileCopyrightText: 2014 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:postgresql:postgresql";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.804710");
  script_version("2024-02-16T05:06:55+0000");
  script_cve_id("CVE-2014-0060", "CVE-2014-0061", "CVE-2014-0062", "CVE-2014-0063",
                "CVE-2014-0064", "CVE-2014-0065", "CVE-2014-0066");
  script_tag(name:"cvss_base", value:"6.5");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:S/C:P/I:P/A:P");
  script_tag(name:"last_modification", value:"2024-02-16 05:06:55 +0000 (Fri, 16 Feb 2024)");
  script_tag(name:"creation_date", value:"2014-07-07 14:54:12 +0530 (Mon, 07 Jul 2014)");
  script_name("PostgreSQL Multiple Security Bypass Vulnerability (Jul 2014) - Windows");

  script_tag(name:"summary", value:"PostgreSQL is prone to multiple security bypass vulnerabilities.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"Multiple flaws are due to:

  - An error when handling roles can be exploited to revoke access from other
  role members.

  - Multiple errors when handling calls to PL validator functions.

  - Some errors when handling name lookups.

  - Some boundary errors when handling wide datetime input/output.");

  script_tag(name:"impact", value:"Successful exploitation may allow an attacker to bypass certain security
  restrictions, cause a DoS (Denial of Service), and potentially compromise a vulnerable system.");

  script_tag(name:"affected", value:"PostgreSQL version before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12,
  9.2.x before 9.2.7, and 9.3.x before 9.3.3");

  script_tag(name:"solution", value:"Upgrade to version 9.3.3, 9.2.7, 9.1.12, 9.0.16 or 8.4.20, or later.");

  script_tag(name:"qod_type", value:"remote_banner");
  script_tag(name:"solution_type", value:"VendorFix");

  script_xref(name:"URL", value:"http://secunia.com/advisories/57054");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/65719");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/65723");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/65724");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/65725");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/65727");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/65728");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/65731");
  script_xref(name:"URL", value:"http://xforce.iss.net/xforce/xfdb/91277");
  script_xref(name:"URL", value:"http://wiki.postgresql.org/wiki/20140220securityrelease");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2014 Greenbone AG");
  script_family("Databases");
  script_dependencies("postgresql_detect.nasl", "secpod_postgresql_detect_lin.nasl", "secpod_postgresql_detect_win.nasl", "os_detection.nasl");
  script_mandatory_keys("postgresql/detected", "Host/runs_windows");

  exit(0);
}

include("version_func.inc");
include("host_details.inc");

if(isnull(port = get_app_port(cpe:CPE)))
  exit(0);

if(!infos = get_app_version_and_location(cpe:CPE, port:port, exit_no_version:TRUE))
  exit(0);

vers = infos["version"];
loc = infos["location"];

if(vers !~ "^(8\.4|9\.[0-3])\.")
  exit(99);

if(version_in_range(version:vers, test_version:"8.4", test_version2:"8.4.19") ||
   version_in_range(version:vers, test_version:"9.0", test_version2:"9.0.15") ||
   version_in_range(version:vers, test_version:"9.1", test_version2:"9.1.11") ||
   version_in_range(version:vers, test_version:"9.2", test_version2:"9.2.6") ||
   version_in_range(version:vers, test_version:"9.3", test_version2:"9.3.2")) {
  report = report_fixed_ver(installed_version:vers, fixed_version:"See references", install_path:loc);
  security_message(port:port, data:report);
  exit(0);
}

exit(99);

9.7 High

AI Score

Confidence

High

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.927 High

EPSS

Percentile

99.0%