![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.51534 |
Category: | Conectiva Local Security Checks |
Title: | Conectiva Security Advisory CLA-2002:524 |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing updates announced in advisory CLA-2002:524. Postgresql[1] is a sophisticated relational database which supports almost all SQL constructs, including subselects, transactions and user-defined types and functions. Mordred Labs vulnerabilities in the postgresql database: - buffer overflow in the rpad() and lpad() functions - buffer overflow in the repeat() function - buffer overflow in the cash_words() function Other vulnerabilities were also fixed[2] by the postgresql developers: - buffer overflow in functions dealing with date/time and timezone - more buffer overflows, this time in the circle_poly(), path_encode() and path_addr() functions, reported again by CVS[6] at this time and were not included in the official 7.2.2 release, but are included in this update. Thanks to Martin Schulze In order to exploit any of these vulnerabilities, it is necessary for the attacker to be able to query the database somehow. Some scenarios where this could happen: - the attacker already has an account in the database server and can execute queries - for example, web applications which query the database but do not adequately filter form or URL data and are vulnerable to SQL command injection. Whatever the scenario is, it is not possible to directly obtain root privileges through these vulnerabilities, because the postgresql service runs as a non-root user specifically created for it. But it is likely possible to compromise the data in the database and/or execute other attacks after exploring the above vulnerabilities. Solution: The apt tool can be used to perform RPM package upgrades by running 'apt-get update' followed by 'apt-get upgrade' http://www.postgresql.com http://archives.postgresql.org/pgsql-announce/2002-08/msg00004.php http://online.securityfocus.com/archive/1/288305 http://online.securityfocus.com/archive/1/288334 http://online.securityfocus.com/archive/1/288036 http://developer.postgresql.org/cvsweb.cgi/pgsql-server/src/backend/utils/adt/geo_ops.c.diff?r1=1.63&r2=1.64 http://www.securityspace.com/smysecure/catid.html?in=CLA-2002:524 http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=002002 Risk factor : High |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |