Vulnerability & Exploit Database

Back to search

RHSA-2012:0678: postgresql and postgresql84 security update

Severity CVSS Published Added Modified
7 (AV:N/AC:M/Au:N/C:P/I:P/A:P) May 21, 2012 June 11, 2012 July 04, 2017


PostgreSQL is an advanced object-relational database management system(DBMS).The pg_dump utility inserted object names literally into comments in theSQL script it produces. An unprivileged database user could create anobject whose name includes a newline followed by an SQL command. This SQLcommand might then be executed by a privileged user during later restore ofthe backup dump, allowing privilege escalation. (CVE-2012-0868)When configured to do SSL certificate verification, PostgreSQL only checkedthe first 31 characters of the certificate's Common Name field. Dependingon the configuration, this could allow an attacker to impersonate a serveror a client using a certificate from a trusted Certificate Authority issuedfor a different name. (CVE-2012-0867)CREATE TRIGGER did not do a permissions check on the trigger function tobe called. This could possibly allow an authenticated database user tocall a privileged trigger function on data of their choosing.(CVE-2012-0866)These updated packages upgrade PostgreSQL to version 8.4.11, which fixesthese issues as well as several data-corruption issues and lessernon-security issues. Refer to the PostgreSQL Release Notes for a full listof changes: PostgreSQL users are advised to upgrade to these updated packages,which correct these issues. If the postgresql service is running, it willbe automatically restarted after installing this update.

Scan For This Vulnerability

Use our top-rated tool to discover, prioritize, and remediate your vulnerabilities

 Free InsightVM Trial




Related Vulnerabilities