Lucene search

K
openvasCopyright (C) 2011 Greenbone AGOPENVAS:1361412562310880763
HistoryAug 09, 2011 - 12:00 a.m.

CentOS Update for perl-DBD-Pg CESA-2009:0479 centos5 i386

2011-08-0900:00:00
Copyright (C) 2011 Greenbone AG
plugins.openvas.org
6

7.6 High

AI Score

Confidence

High

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.02 Low

EPSS

Percentile

88.6%

The remote host is missing an update for the

# SPDX-FileCopyrightText: 2011 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_xref(name:"URL", value:"http://lists.centos.org/pipermail/centos-announce/2009-May/015877.html");
  script_oid("1.3.6.1.4.1.25623.1.0.880763");
  script_version("2023-07-12T05:05:04+0000");
  script_tag(name:"last_modification", value:"2023-07-12 05:05:04 +0000 (Wed, 12 Jul 2023)");
  script_tag(name:"creation_date", value:"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_xref(name:"CESA", value:"2009:0479");
  script_cve_id("CVE-2009-0663", "CVE-2009-1341");
  script_name("CentOS Update for perl-DBD-Pg CESA-2009:0479 centos5 i386");

  script_tag(name:"summary", value:"The remote host is missing an update for the 'perl-DBD-Pg'
  package(s) announced via the referenced advisory.");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2011 Greenbone AG");
  script_family("CentOS Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/centos", "ssh/login/rpms", re:"ssh/login/release=CentOS5");
  script_tag(name:"affected", value:"perl-DBD-Pg on CentOS 5");
  script_tag(name:"insight", value:"Perl DBI is a database access Application Programming Interface (API) for
  the Perl language. perl-DBD-Pg allows Perl applications to access
  PostgreSQL database servers.

  A heap-based buffer overflow flaw was discovered in the pg_getline function
  implementation. If the pg_getline or getline functions read large,
  untrusted records from a database, it could cause an application using
  these functions to crash or, possibly, execute arbitrary code.
  (CVE-2009-0663)

  Note: After installing this update, pg_getline may return more data than
  specified by its second argument, as this argument will be ignored. This is
  consistent with current upstream behavior. Previously, the length limit
  (the second argument) was not enforced, allowing a buffer overflow.

  A memory leak flaw was found in the function performing the de-quoting of
  BYTEA type values acquired from a database. An attacker able to cause an
  application using perl-DBD-Pg to perform a large number of SQL queries
  returning BYTEA records, could cause the application to use excessive
  amounts of memory or, possibly, crash. (CVE-2009-1341)

  All users of perl-DBD-Pg are advised to upgrade to this updated package,
  which contains backported patches to fix these issues. Applications using
  perl-DBD-Pg must be restarted for the update to take effect.");
  script_tag(name:"solution", value:"Please install the updated packages.");
  script_tag(name:"qod_type", value:"package");
  script_tag(name:"solution_type", value:"VendorFix");
  exit(0);
}

include("revisions-lib.inc");
include("pkg-lib-rpm.inc");

release = rpm_get_ssh_release();
if(!release)
  exit(0);

res = "";

if(release == "CentOS5")
{

  if ((res = isrpmvuln(pkg:"perl-DBD-Pg", rpm:"perl-DBD-Pg~1.49~2.el5_3.1", rls:"CentOS5")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if (__pkg_match) exit(99);
  exit(0);
}

7.6 High

AI Score

Confidence

High

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.02 Low

EPSS

Percentile

88.6%