Lucene search

K
postgresqlPostgreSQL Global Development GroupPOSTGRESQL:CVE-2023-5870
HistoryNov 09, 2023 - 12:00 a.m.

Vulnerability in core server (CVE-2023-5870)

2023-11-0900:00:00
PostgreSQL Global Development Group
www.postgresql.org
1
vulnerability
core server
signaling
superuser processes
postgresql
denial of service
extension
background worker
exploit

CVSS3

4.4

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H

AI Score

7

Confidence

High

Role “pg_signal_backend” can signal certain superuser processes

Documentation says the pg_signal_backend role cannot signal “a backend owned by a superuser”. On the contrary, it can signal background workers, including the logical replication launcher. It can signal autovacuum workers and the autovacuum launcher. Signaling autovacuum workers and those two launchers provides no meaningful exploit, so exploiting this vulnerability requires a non-core extension with a less-resilient background worker. For example, a non-core background worker that does not auto-restart would experience a denial of service with respect to that particular background worker.

The PostgreSQL project thanks Hemanth Sandrana and Mahendrakar Srinivasarao for reporting this problem.

Affected configurations

Vulners
Node
postgresqlpostgresqlRange<16.1
OR
postgresqlpostgresqlRange<14.10
OR
postgresqlpostgresqlRange<15.5
OR
postgresqlpostgresqlRange<13.13
OR
postgresqlpostgresqlRange<12.17
VendorProductVersionCPE
postgresqlpostgresql*cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*

CVSS3

4.4

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H

AI Score

7

Confidence

High