CentOS Update for postgresql84 CESA-2012:0678 centos5. The remote host is missing an update for the 'postgresql84' package(s)
Reporter | Title | Published | Views | Family All 116 |
---|---|---|---|---|
![]() | postgresql and postgresql84 security update | 21 May 201200:00 | â | oraclelinux |
![]() | postgresql and postgresql84 security update | 25 Jun 201200:00 | â | oraclelinux |
![]() | postgresql security update | 21 May 201200:00 | â | oraclelinux |
![]() | Mandriva Update for postgresql MDVSA-2012:026 (postgresql) | 7 Mar 201200:00 | â | openvas |
![]() | Ubuntu Update for postgresql-9.1 USN-1378-1 | 7 Mar 201200:00 | â | openvas |
![]() | CentOS Update for postgresql CESA-2012:0678 centos6 | 30 Jul 201200:00 | â | openvas |
![]() | CentOS Update for postgresql CESA-2012:0678 centos6 | 30 Jul 201200:00 | â | openvas |
![]() | FreeBSD Ports: postgresql-client | 12 Mar 201200:00 | â | openvas |
![]() | Fedora Update for postgresql FEDORA-2012-2591 | 2 Apr 201200:00 | â | openvas |
![]() | Fedora Update for postgresql FEDORA-2012-2589 | 9 Mar 201200:00 | â | openvas |
# SPDX-FileCopyrightText: 2012 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.881186");
script_version("2023-07-10T08:07:43+0000");
script_tag(name:"last_modification", value:"2023-07-10 08:07:43 +0000 (Mon, 10 Jul 2023)");
script_tag(name:"creation_date", value:"2012-07-30 16:37:03 +0530 (Mon, 30 Jul 2012)");
script_cve_id("CVE-2012-0866", "CVE-2012-0867", "CVE-2012-0868");
script_tag(name:"cvss_base", value:"6.8");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:P/I:P/A:P");
script_xref(name:"CESA", value:"2012:0678");
script_name("CentOS Update for postgresql84 CESA-2012:0678 centos5");
script_xref(name:"URL", value:"http://lists.centos.org/pipermail/centos-announce/2012-May/018648.html");
script_xref(name:"URL", value:"http://www.postgresql.org/docs/8.4/static/release.html");
script_tag(name:"summary", value:"The remote host is missing an update for the 'postgresql84'
package(s) announced via the referenced advisory.");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2012 Greenbone AG");
script_family("CentOS Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/centos", "ssh/login/rpms", re:"ssh/login/release=CentOS5");
script_tag(name:"affected", value:"postgresql84 on CentOS 5");
script_tag(name:"solution", value:"Please install the updated packages.");
script_tag(name:"insight", value:"PostgreSQL is an advanced object-relational database management system
(DBMS).
The pg_dump utility inserted object names literally into comments in the
SQL script it produces. An unprivileged database user could create an
object whose name includes a newline followed by an SQL command. This SQL
command might then be executed by a privileged user during later restore of
the backup dump, allowing privilege escalation. (CVE-2012-0868)
When configured to do SSL certificate verification, PostgreSQL only checked
the first 31 characters of the certificate's Common Name field. Depending
on the configuration, this could allow an attacker to impersonate a server
or a client using a certificate from a trusted Certificate Authority issued
for a different name. (CVE-2012-0867)
CREATE TRIGGER did not do a permissions check on the trigger function to
be called. This could possibly allow an authenticated database user to
call a privileged trigger function on data of their choosing.
(CVE-2012-0866)
These updated packages upgrade PostgreSQL to version 8.4.11, which fixes
these issues as well as several data-corruption issues and lesser
non-security issues. Refer to the linked PostgreSQL Release Notes for a full list
of changes.
All PostgreSQL users are advised to upgrade to these updated packages,
which correct these issues. If the postgresql service is running, it will
be automatically restarted after installing this update.");
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release)
exit(0);
res = "";
if(release == "CentOS5")
{
if ((res = isrpmvuln(pkg:"postgresql84", rpm:"postgresql84~8.4.11~1.el5_8", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"postgresql84-contrib", rpm:"postgresql84-contrib~8.4.11~1.el5_8", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"postgresql84-devel", rpm:"postgresql84-devel~8.4.11~1.el5_8", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"postgresql84-docs", rpm:"postgresql84-docs~8.4.11~1.el5_8", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"postgresql84-libs", rpm:"postgresql84-libs~8.4.11~1.el5_8", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"postgresql84-plperl", rpm:"postgresql84-plperl~8.4.11~1.el5_8", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"postgresql84-plpython", rpm:"postgresql84-plpython~8.4.11~1.el5_8", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"postgresql84-pltcl", rpm:"postgresql84-pltcl~8.4.11~1.el5_8", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"postgresql84-python", rpm:"postgresql84-python~8.4.11~1.el5_8", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"postgresql84-server", rpm:"postgresql84-server~8.4.11~1.el5_8", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"postgresql84-tcl", rpm:"postgresql84-tcl~8.4.11~1.el5_8", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"postgresql84-test", rpm:"postgresql84-test~8.4.11~1.el5_8", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99);
exit(0);
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo