|Category:||Debian Local Security Checks|
|Title:||Debian LTS Advisory ([SECURITY] [DLA-1874-1] postgresql-9.4 security update)|
|Summary:||The remote host is missing an update for the 'postgresql-9.4'; package(s) announced via the DSA-1874-1 advisory.|
The remote host is missing an update for the 'postgresql-9.4'
package(s) announced via the DSA-1874-1 advisory.
* CVE-2019-10208: `TYPE` in `pg_temp` executes arbitrary SQL during
`SECURITY DEFINER` execution
Versions Affected: 9.4 - 11
Given a suitable `SECURITY DEFINER` function, an attacker can execute
arbitrary SQL under the identity of the function owner. An attack
requires `EXECUTE` permission on the function, which must itself contain
a function call having inexact argument type match. For example,
`length('foo'::varchar)` and `length('foo')` are inexact, while
`length('foo'::text)` is exact. As part of exploiting this
vulnerability, the attacker uses `CREATE DOMAIN` to create a type in a
`pg_temp` schema. The attack pattern and fix are similar to that for
Writing `SECURITY DEFINER` functions continues to require following the
considerations noted in the documentation:
The PostgreSQL project thanks Tom Lane for reporting this problem.
'postgresql-9.4' package(s) on Debian Linux.
For Debian 8 'Jessie', this problem has been fixed in version
We recommend that you upgrade your postgresql-9.4 packages.
Common Vulnerability Exposure (CVE) ID: CVE-2007-2138|
BugTraq ID: 23618
Debian Security Information: DSA-1309 (Google Search)
Debian Security Information: DSA-1311 (Google Search)
RedHat Security Advisories: RHSA-2007:0336
XForce ISS Database: postgresql-searchpath-privilege-escalation(33842)
|Copyright||Copyright (C) 2019 Greenbone Networks GmbH|
|This is only one of 76014 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.