Lucene search

K
ubuntuUbuntuUSN-454-1
HistoryApr 27, 2007 - 12:00 a.m.

PostgreSQL vulnerability

2007-04-2700:00:00
ubuntu.com
32

9.2 High

AI Score

Confidence

High

6 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

0.004 Low

EPSS

Percentile

72.6%

Releases

  • Ubuntu 7.04
  • Ubuntu 6.10
  • Ubuntu 6.06

Details

PostgreSQL did not handle the “search_path” configuration option in a
secure way for functions declared as “SECURITY DEFINER”.

Previously, an attacker could override functions and operators used by
the security definer function to execute arbitrary SQL commands with
the privileges of the user who created the security definer function.
The updated version does not search the temporary table schema for
functions and operators any more.

Similarly, an attacker could put forged tables into the temporary
table schema to trick the security definer function into using
attacker defined data for processing. This was possible because the
temporary schema was always implicitly searched first before all other
entries in “search_path”. The updated version now supports explicit
placement of the temporary schema. Please see the HTML documentation
or the manual page for “CREATE FUNCTION” for details and an example
how to write security definer functions in a secure way.

OSVersionArchitecturePackageVersionFilename
Ubuntu7.04noarchpostgresql-8.2< 8.2.4-0ubuntu0.7.04UNKNOWN
Ubuntu6.10noarchpostgresql-8.1< 8.1.9-0ubuntu0.6.10UNKNOWN
Ubuntu6.06noarchpostgresql-8.1< 8.1.9-0ubuntu0.6.06UNKNOWN

9.2 High

AI Score

Confidence

High

6 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

0.004 Low

EPSS

Percentile

72.6%