![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.51534 |
Kategorie: | Conectiva Local Security Checks |
Titel: | Conectiva Security Advisory CLA-2002:524 |
Zusammenfassung: | NOSUMMARY |
Beschreibung: | Description: The remote host is missing updates announced in advisory CLA-2002:524. Postgresql[1] is a sophisticated relational database which supports almost all SQL constructs, including subselects, transactions and user-defined types and functions. Mordred Labs vulnerabilities in the postgresql database: - buffer overflow in the rpad() and lpad() functions - buffer overflow in the repeat() function - buffer overflow in the cash_words() function Other vulnerabilities were also fixed[2] by the postgresql developers: - buffer overflow in functions dealing with date/time and timezone - more buffer overflows, this time in the circle_poly(), path_encode() and path_addr() functions, reported again by CVS[6] at this time and were not included in the official 7.2.2 release, but are included in this update. Thanks to Martin Schulze In order to exploit any of these vulnerabilities, it is necessary for the attacker to be able to query the database somehow. Some scenarios where this could happen: - the attacker already has an account in the database server and can execute queries - for example, web applications which query the database but do not adequately filter form or URL data and are vulnerable to SQL command injection. Whatever the scenario is, it is not possible to directly obtain root privileges through these vulnerabilities, because the postgresql service runs as a non-root user specifically created for it. But it is likely possible to compromise the data in the database and/or execute other attacks after exploring the above vulnerabilities. Solution: The apt tool can be used to perform RPM package upgrades by running 'apt-get update' followed by 'apt-get upgrade' http://www.postgresql.com http://archives.postgresql.org/pgsql-announce/2002-08/msg00004.php http://online.securityfocus.com/archive/1/288305 http://online.securityfocus.com/archive/1/288334 http://online.securityfocus.com/archive/1/288036 http://developer.postgresql.org/cvsweb.cgi/pgsql-server/src/backend/utils/adt/geo_ops.c.diff?r1=1.63&r2=1.64 http://www.securityspace.com/smysecure/catid.html?in=CLA-2002:524 http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=002002 Risk factor : High |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |