Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2006.369.2
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-369-2)
Summary:The remote host is missing an update for the 'postgresql-8.1' package(s) announced via the USN-369-2 advisory.
Description:Summary:
The remote host is missing an update for the 'postgresql-8.1' package(s) announced via the USN-369-2 advisory.

Vulnerability Insight:
USN-369-1 fixed three minor PostgreSQL 8.1 vulnerabilities for Ubuntu 6.06 LTS.
This update provides the corresponding update for Ubuntu 6.10.

Original advisory details:

Michael Fuhr discovered an incorrect type check when handling unknown
literals. By attempting to coerce such a literal to the ANYARRAY type,
a local authenticated attacker could cause a server crash. (CVE-2006-5541)

Josh Drake and Alvaro Herrera reported a crash when using aggregate
functions in UPDATE statements. A local authenticated attacker could
exploit this to crash the server backend. This update disables this
construct, since it is not very well defined and forbidden by the SQL
standard. (CVE-2006-5540)

Sergey Koposov discovered a flaw in the duration logging. This could
cause a server crash under certain circumstances. (CVE-2006-5542)

Please note that these flaws can usually not be exploited through web
and other applications that use a database and are exposed to
untrusted input, so these flaws do not pose a threat in usual setups.

Affected Software/OS:
'postgresql-8.1' package(s) on Ubuntu 6.10.

Solution:
Please install the updated package(s).

CVSS Score:
4.0

CVSS Vector:
AV:N/AC:L/Au:S/C:N/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-5540
BugTraq ID: 20717
http://www.securityfocus.com/bid/20717
http://www.mandriva.com/security/advisories?name=MDKSA-2006:194
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11425
http://www.redhat.com/support/errata/RHSA-2007-0064.html
http://www.redhat.com/support/errata/RHSA-2007-0067.html
http://www.redhat.com/support/errata/RHSA-2007-0068.html
http://securitytracker.com/id?1017115
http://secunia.com/advisories/22562
http://secunia.com/advisories/22584
http://secunia.com/advisories/22606
http://secunia.com/advisories/22636
http://secunia.com/advisories/23048
http://secunia.com/advisories/23132
http://secunia.com/advisories/24094
http://secunia.com/advisories/24284
http://secunia.com/advisories/24577
SGI Security Advisory: 20070201-01-P
ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc
SuSE Security Announcement: SUSE-SR:2006:027 (Google Search)
http://www.novell.com/linux/security/advisories/2006_27_sr.html
http://www.trustix.org/errata/2006/0059/
http://www.ubuntu.com/usn/usn-369-1
http://www.ubuntu.com/usn/usn-369-2
http://www.vupen.com/english/advisories/2006/4182
Common Vulnerability Exposure (CVE) ID: CVE-2006-5541
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10905
Common Vulnerability Exposure (CVE) ID: CVE-2006-5542
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10122
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.