![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.58375 |
Category: | Mandrake Local Security Checks |
Title: | Mandrake Security Advisory MDKSA-2007:094 (postgresql) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to postgresql announced via advisory MDKSA-2007:094. A weakness in previous versions of PostgreSQL was found in the security definer functions in which an authenticated but otherwise unprivileged SQL user could use temporary objects to execute arbitrary code with the privileges of the security-definer function. IMPORTANT NOTICE FOR CORPORATE SERVER/DESKTOP 3.0 USERS: In addition, packages for Corporate Server/Desktop 3.0 have been updated to the latest PostgreSQL 7.4.17 which requires some attention when upgrading. To take advantage of the new version, and to ensure data coherency, we strongly recommend dumping the old databases, re-initializing the database, and then reloading the dumped data. This can be accomplished as root using: # service postgresql start # su - postgres $ pg_dumpall >/tmp/database.dump $ exit # service postgresql stop # mv /var/lib/pgsql /var/lib/pgsql.bk # urpmi.update -a && urpmi --auto-select # service postgresql start # service postgresql restart # su - postgres $ /usr/bin/psql -d template1 -f /tmp/database.dump $ exit Only Corporate Server/Desktop 3.0 requires the dump/reload steps the other Mandriva Linux platforms do not require this step. Notice that the double-restart of the postgresql service is in fact required. Updated packages have been patched to correct this issue. Affected: 2007.0, 2007.1, Corporate 3.0, Corporate 4.0 Solution: To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2007:094 Risk factor : High CVSS Score: 6.0 |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2007-2138 BugTraq ID: 23618 http://www.securityfocus.com/bid/23618 Debian Security Information: DSA-1309 (Google Search) http://www.debian.org/security/2007/dsa-1309 Debian Security Information: DSA-1311 (Google Search) http://www.debian.org/security/2007/dsa-1311 http://security.gentoo.org/glsa/glsa-200705-12.xml http://www.mandriva.com/security/advisories?name=MDKSA-2007:094 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10090 RedHat Security Advisories: RHSA-2007:0336 http://rhn.redhat.com/errata/RHSA-2007-0336.html http://www.redhat.com/support/errata/RHSA-2007-0337.html http://www.securitytracker.com/id?1017974 http://secunia.com/advisories/24989 http://secunia.com/advisories/24999 http://secunia.com/advisories/25005 http://secunia.com/advisories/25019 http://secunia.com/advisories/25037 http://secunia.com/advisories/25058 http://secunia.com/advisories/25184 http://secunia.com/advisories/25238 http://secunia.com/advisories/25334 http://secunia.com/advisories/25717 http://secunia.com/advisories/25720 http://secunia.com/advisories/25725 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102894-1 http://www.trustix.org/errata/2007/0015/ http://www.ubuntu.com/usn/usn-454-1 http://www.vupen.com/english/advisories/2007/1497 http://www.vupen.com/english/advisories/2007/1549 XForce ISS Database: postgresql-searchpath-privilege-escalation(33842) https://exchange.xforce.ibmcloud.com/vulnerabilities/33842 |
Copyright | Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |