Rapid7 Vulnerability & Exploit Database

RHSA-2012:1264: postgresql security update

Back to Search

RHSA-2012:1264: postgresql security update

Severity
5
CVSS
(AV:N/AC:M/Au:S/C:P/I:P/A:N)
Published
09/13/2012
Created
07/25/2018
Added
09/17/2012
Modified
07/04/2017

Description

PostgreSQL is an advanced object-relational database management system(DBMS).It was found that the optional PostgreSQL xml2 contrib module allowed localfiles and remote URLs to be read and written to with the privileges of thedatabase server when parsing Extensible Stylesheet Language Transformations(XSLT). An unprivileged database user could use this flaw to read and writeto local files (such as the database's configuration files) and remote URLsthey would otherwise not have access to by issuing a specially-crafted SQLquery. (CVE-2012-3488)Red Hat would like to thank the PostgreSQL project for reporting thisissue. Upstream acknowledges Peter Eisentraut as the original reporter.All PostgreSQL users are advised to upgrade to these updated packages,which contain a backported patch to correct this issue. If the postgresqlservice is running, it will be automatically restarted after installingthis update.

Solution(s)

  • redhat-upgrade-postgresql
  • redhat-upgrade-postgresql-contrib
  • redhat-upgrade-postgresql-debuginfo
  • redhat-upgrade-postgresql-devel
  • redhat-upgrade-postgresql-docs
  • redhat-upgrade-postgresql-libs
  • redhat-upgrade-postgresql-pl
  • redhat-upgrade-postgresql-python
  • redhat-upgrade-postgresql-server
  • redhat-upgrade-postgresql-tcl
  • redhat-upgrade-postgresql-test

References

  • redhat-upgrade-postgresql
  • redhat-upgrade-postgresql-contrib
  • redhat-upgrade-postgresql-debuginfo
  • redhat-upgrade-postgresql-devel
  • redhat-upgrade-postgresql-docs
  • redhat-upgrade-postgresql-libs
  • redhat-upgrade-postgresql-pl
  • redhat-upgrade-postgresql-python
  • redhat-upgrade-postgresql-server
  • redhat-upgrade-postgresql-tcl
  • redhat-upgrade-postgresql-test

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;