Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.56766
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2006:0526
Summary:NOSUMMARY
Description:Description:

The remote host is missing updates announced in
advisory RHSA-2006:0526.

PostgreSQL is an advanced Object-Relational database management system
(DBMS).

A bug was found in the way PostgreSQL's PQescapeString function escapes
strings when operating in a multibyte character encoding. It is possible
for an attacker to provide an application a carefully crafted string
containing invalidly-encoded characters, which may be improperly escaped,
allowing the attacker to inject malicious SQL. While this update fixes how
PQescapeString operates, the PostgreSQL server has also been modified to
prevent such an attack occurring through unpatched clients.
(CVE-2006-2313, CVE-2006-2314). More details about this issue are
available in the linked PostgreSQL technical documentation.

An integer signedness bug was found in the way PostgreSQL generated
password salts. The actual salt size is only half the size of the expected
salt, making the process of brute forcing password hashes slightly easier.
This update will not strengthen already existing passwords, but all newly
assigned passwords will have the proper salt length. (CVE-2006-0591)

Users of PostgreSQL should upgrade to these updated packages containing
PostgreSQL version 7.4.13, which corrects these issues.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2006-0526.html
http://www.postgresql.org/docs/techdocs.52
http://www.redhat.com/security/updates/classification/#important

Risk factor : High

CVSS Score:
7.5

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-0591
Bugtraq: 20060207 crypt_blowfish 1.0 (Google Search)
http://www.securityfocus.com/archive/1/424260/100/0/threaded
http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/glibc/crypt_blowfish/crypt_gensalt.c?only_with_tag=CRYPT_BLOWFISH_1_0
http://www.osvdb.org/23005
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11502
http://www.redhat.com/support/errata/RHSA-2006-0526.html
http://secunia.com/advisories/18772
http://secunia.com/advisories/20232
http://secunia.com/advisories/20653
http://secunia.com/advisories/20782
SGI Security Advisory: 20060602-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc
http://www.vupen.com/english/advisories/2006/0477
XForce ISS Database: cryptblowfish-salt-information-disclosure(24590)
https://exchange.xforce.ibmcloud.com/vulnerabilities/24590
Common Vulnerability Exposure (CVE) ID: CVE-2006-2313
BugTraq ID: 18092
http://www.securityfocus.com/bid/18092
Bugtraq: 20060523 PostgreSQL security releases 8.1.4, 8.0.8, 7.4.13, 7.3.15 (Google Search)
http://www.securityfocus.com/archive/1/435038/100/0/threaded
Bugtraq: 20060524 rPSA-2006-0080-1 postgresql postgresql-server (Google Search)
http://www.securityfocus.com/archive/1/435161/100/0/threaded
Debian Security Information: DSA-1087 (Google Search)
http://www.debian.org/security/2006/dsa-1087
http://security.gentoo.org/glsa/glsa-200607-04.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2006:098
http://archives.postgresql.org/pgsql-announce/2006-05/msg00010.php
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10618
http://securitytracker.com/id?1016142
http://secunia.com/advisories/20231
http://secunia.com/advisories/20314
http://secunia.com/advisories/20435
http://secunia.com/advisories/20451
http://secunia.com/advisories/20503
http://secunia.com/advisories/20555
http://secunia.com/advisories/21001
SuSE Security Announcement: SUSE-SA:2006:030 (Google Search)
http://lists.suse.com/archive/suse-security-announce/2006-Jun/0002.html
http://www.trustix.org/errata/2006/0032/
https://usn.ubuntu.com/288-1/
http://www.ubuntu.com/usn/usn-288-2
http://www.vupen.com/english/advisories/2006/1941
XForce ISS Database: postgresql-multibyte-sql-injection(26627)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26627
Common Vulnerability Exposure (CVE) ID: CVE-2006-2314
http://www.osvdb.org/25731
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9947
http://secunia.com/advisories/21749
SuSE Security Announcement: SUSE-SR:2006:021 (Google Search)
http://www.novell.com/linux/security/advisories/2006_21_sr.html
http://www.ubuntu.com/usn/usn-288-3
XForce ISS Database: postgresql-ascii-sql-injection(26628)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26628
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.