Rapid7 Vulnerability & Exploit Database

RHSA-2010:0908: postgresql security update

Back to Search

RHSA-2010:0908: postgresql security update

Severity
6
CVSS
(AV:N/AC:M/Au:S/C:P/I:P/A:P)
Published
10/06/2010
Created
07/25/2018
Added
01/04/2011
Modified
07/04/2017

Description

PostgreSQL is an advanced object-relational database management system(DBMS). PL/Perl and PL/Tcl allow users to write PostgreSQL functions in thePerl and Tcl languages. The PostgreSQL SECURITY DEFINER parameter, whichcan be used when creating a new PostgreSQL function, specifies that thefunction will be executed with the privileges of the user that created it.It was discovered that a user could utilize the features of the PL/Perl andPL/Tcl languages to modify the behavior of a SECURITY DEFINER functioncreated by a different user. If the PL/Perl or PL/Tcl language was used toimplement a SECURITY DEFINER function, an authenticated database user coulduse a PL/Perl or PL/Tcl script to modify the behavior of that functionduring subsequent calls in the same session. This would result in themodified or injected code also being executed with the privileges of theuser who created the SECURITY DEFINER function, possibly leading toprivilege escalation. (CVE-2010-3433)These updated postgresql packages upgrade PostgreSQL to version 8.4.5.Refer to the PostgreSQL Release Notes for a list of changes:http://www.postgresql.org/docs/8.4/static/release.htmlAll PostgreSQL users are advised to upgrade to these updated packages,which correct this issue. If the postgresql service is running, it will beautomatically restarted after installing this update.

Solution(s)

  • redhat-upgrade-postgresql
  • redhat-upgrade-postgresql-contrib
  • redhat-upgrade-postgresql-debuginfo
  • redhat-upgrade-postgresql-devel
  • redhat-upgrade-postgresql-docs
  • redhat-upgrade-postgresql-libs
  • redhat-upgrade-postgresql-plperl
  • redhat-upgrade-postgresql-plpython
  • redhat-upgrade-postgresql-pltcl
  • redhat-upgrade-postgresql-server
  • redhat-upgrade-postgresql-test

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;