Rapid7 VulnDB

RHSA-2012:1037: postgresql and postgresql84 security update

Back to Search

RHSA-2012:1037: postgresql and postgresql84 security update

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
06/25/2012
Created
07/25/2018
Added
06/28/2012
Modified
07/04/2017

Description

PostgreSQL is an advanced object-relational database management system(DBMS).A flaw was found in the way the crypt() password hashing function from theoptional PostgreSQL pgcrypto contrib module performed passwordtransformation when used with the DES algorithm. If the password string tobe hashed contained the 0x80 byte value, the remainder of the string wasignored when calculating the hash, significantly reducing the passwordstrength. This made brute-force guessing more efficient as the wholepassword was not required to gain access to protected resources.(CVE-2012-2143)Note: With this update, the rest of the string is properly included in theDES hash; therefore, any previously stored password values that areaffected by this issue will no longer match. In such cases, it will benecessary for those stored password hashes to be updated.A denial of service flaw was found in the way the PostgreSQL serverperformed a user privileges check when applying SECURITY DEFINER or SETattributes to a procedural language's (such as PL/Perl or PL/Python) callhandler function. A non-superuser database owner could use this flaw tocause the PostgreSQL server to crash due to infinite recursion.(CVE-2012-2655)Upstream acknowledges Rubin Xu and Joseph Bonneau as the original reportersof the CVE-2012-2143 issue.These updated packages upgrade PostgreSQL to version 8.4.12, which fixesthese issues as well as several non-security issues. Refer to thePostgreSQL Release Notes for a full list of changes:http://www.postgresql.org/docs/8.4/static/release.htmlAll PostgreSQL users are advised to upgrade to these updated packages,which correct these issues. If the postgresql service is running, it willbe automatically restarted after installing this update.

Solution(s)

  • redhat-upgrade-postgresql
  • redhat-upgrade-postgresql-contrib
  • redhat-upgrade-postgresql-debuginfo
  • redhat-upgrade-postgresql-devel
  • redhat-upgrade-postgresql-docs
  • redhat-upgrade-postgresql-libs
  • redhat-upgrade-postgresql-plperl
  • redhat-upgrade-postgresql-plpython
  • redhat-upgrade-postgresql-pltcl
  • redhat-upgrade-postgresql-server
  • redhat-upgrade-postgresql-test
  • redhat-upgrade-postgresql84
  • redhat-upgrade-postgresql84-contrib
  • redhat-upgrade-postgresql84-debuginfo
  • redhat-upgrade-postgresql84-devel
  • redhat-upgrade-postgresql84-docs
  • redhat-upgrade-postgresql84-libs
  • redhat-upgrade-postgresql84-plperl
  • redhat-upgrade-postgresql84-plpython
  • redhat-upgrade-postgresql84-pltcl
  • redhat-upgrade-postgresql84-python
  • redhat-upgrade-postgresql84-server
  • redhat-upgrade-postgresql84-tcl
  • redhat-upgrade-postgresql84-test

References

  • redhat-upgrade-postgresql
  • redhat-upgrade-postgresql-contrib
  • redhat-upgrade-postgresql-debuginfo
  • redhat-upgrade-postgresql-devel
  • redhat-upgrade-postgresql-docs
  • redhat-upgrade-postgresql-libs
  • redhat-upgrade-postgresql-plperl
  • redhat-upgrade-postgresql-plpython
  • redhat-upgrade-postgresql-pltcl
  • redhat-upgrade-postgresql-server
  • redhat-upgrade-postgresql-test
  • redhat-upgrade-postgresql84
  • redhat-upgrade-postgresql84-contrib
  • redhat-upgrade-postgresql84-debuginfo
  • redhat-upgrade-postgresql84-devel
  • redhat-upgrade-postgresql84-docs
  • redhat-upgrade-postgresql84-libs
  • redhat-upgrade-postgresql84-plperl
  • redhat-upgrade-postgresql84-plpython
  • redhat-upgrade-postgresql84-pltcl
  • redhat-upgrade-postgresql84-python
  • redhat-upgrade-postgresql84-server
  • redhat-upgrade-postgresql84-tcl
  • redhat-upgrade-postgresql84-test

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;