Rapid7 Vulnerability & Exploit Database

RHSA-2012:0677: postgresql security update

Back to Search

RHSA-2012:0677: postgresql security update

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
05/21/2012
Created
07/25/2018
Added
06/11/2012
Modified
07/04/2017

Description

PostgreSQL is an advanced object-relational database management system(DBMS).The pg_dump utility inserted object names literally into comments in theSQL script it produces. An unprivileged database user could create anobject whose name includes a newline followed by an SQL command. This SQLcommand might then be executed by a privileged user during later restore ofthe backup dump, allowing privilege escalation. (CVE-2012-0868)CREATE TRIGGER did not do a permissions check on the trigger function tobe called. This could possibly allow an authenticated database user tocall a privileged trigger function on data of their choosing.(CVE-2012-0866)All PostgreSQL users are advised to upgrade to these updated packages,which contain backported patches to correct these issues. If the postgresqlservice is running, it will be automatically restarted after installingthis update.

Solution(s)

  • redhat-upgrade-postgresql
  • redhat-upgrade-postgresql-contrib
  • redhat-upgrade-postgresql-debuginfo
  • redhat-upgrade-postgresql-devel
  • redhat-upgrade-postgresql-docs
  • redhat-upgrade-postgresql-libs
  • redhat-upgrade-postgresql-pl
  • redhat-upgrade-postgresql-python
  • redhat-upgrade-postgresql-server
  • redhat-upgrade-postgresql-tcl
  • redhat-upgrade-postgresql-test

References

  • redhat-upgrade-postgresql
  • redhat-upgrade-postgresql-contrib
  • redhat-upgrade-postgresql-debuginfo
  • redhat-upgrade-postgresql-devel
  • redhat-upgrade-postgresql-docs
  • redhat-upgrade-postgresql-libs
  • redhat-upgrade-postgresql-pl
  • redhat-upgrade-postgresql-python
  • redhat-upgrade-postgresql-server
  • redhat-upgrade-postgresql-tcl
  • redhat-upgrade-postgresql-test

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;