![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.51534 |
Categoría: | Conectiva Local Security Checks |
Título: | Conectiva Security Advisory CLA-2002:524 |
Resumen: | NOSUMMARY |
Descripción: | Description: The remote host is missing updates announced in advisory CLA-2002:524. Postgresql[1] is a sophisticated relational database which supports almost all SQL constructs, including subselects, transactions and user-defined types and functions. Mordred Labs vulnerabilities in the postgresql database: - buffer overflow in the rpad() and lpad() functions - buffer overflow in the repeat() function - buffer overflow in the cash_words() function Other vulnerabilities were also fixed[2] by the postgresql developers: - buffer overflow in functions dealing with date/time and timezone - more buffer overflows, this time in the circle_poly(), path_encode() and path_addr() functions, reported again by CVS[6] at this time and were not included in the official 7.2.2 release, but are included in this update. Thanks to Martin Schulze In order to exploit any of these vulnerabilities, it is necessary for the attacker to be able to query the database somehow. Some scenarios where this could happen: - the attacker already has an account in the database server and can execute queries - for example, web applications which query the database but do not adequately filter form or URL data and are vulnerable to SQL command injection. Whatever the scenario is, it is not possible to directly obtain root privileges through these vulnerabilities, because the postgresql service runs as a non-root user specifically created for it. But it is likely possible to compromise the data in the database and/or execute other attacks after exploring the above vulnerabilities. Solution: The apt tool can be used to perform RPM package upgrades by running 'apt-get update' followed by 'apt-get upgrade' http://www.postgresql.com http://archives.postgresql.org/pgsql-announce/2002-08/msg00004.php http://online.securityfocus.com/archive/1/288305 http://online.securityfocus.com/archive/1/288334 http://online.securityfocus.com/archive/1/288036 http://developer.postgresql.org/cvsweb.cgi/pgsql-server/src/backend/utils/adt/geo_ops.c.diff?r1=1.63&r2=1.64 http://www.securityspace.com/smysecure/catid.html?in=CLA-2002:524 http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=002002 Risk factor : High |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |