<p>
The following table lists all known security issues.
Please note that versions prior to 9.0 are no longer
-supported and vulnerabilities for these versions may not be included
-in this list. New vulnerabilities in these versions are no longer patched.
+supported. An archive of vulnerabilities found only in in unsupported
+versions is
+<a href="/support/security_archive">on our Security Archive page</a>,
+but vulnerability information on those versions is no longer updated,
+nor are vulnerabilities patched.
</p>
<p>
<td class="colMid">C</td>
<td class="colLast">An authenticated database user can manipulate modules and tied variables in some external procedural languages to execute code with enhanced privileges.<a href="https://wiki.postgresql.org/wiki/20101005securityrelease">Details</a></td>
</tr>
-
- <tr valign="top">
- <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1975">CVE-2010-1975</a></td>
- <td class="colMid">8.4, 8.3, 8.2, 8.1, 8.0, 7.4</td>
- <td class="colMid">8.4.4, 8.3.11, 8.2.17, 8.1.21, 8.0.25, 7.4.29</td>
- <td class="colMid">core server</td>
- <td class="colMid">C</td>
- <td class="colLast">An unprivileged database user can remove superuser-only
-settings that were applied to his account with ALTER USER by a superuser, thus
-bypassing settings that should be enforced.</td>
- </tr>
-
- <tr valign="top">
- <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1169">CVE-2010-1169</a></td>
- <td class="colMid">8.4, 8.3, 8.2, 8.1, 8.0, 7.4</td>
- <td class="colMid">8.4.4, 8.3.11, 8.2.17, 8.1.21, 8.0.25, 7.4.29</td>
- <td class="colMid">core server, limited deployments</td>
- <td class="colMid">C</td>
- <td class="colLast">A vulnerability in Safe.pm and PL/Perl can allow an authenticated user to run arbitrary Perl code on the database
- server if PL/Perl is installed and enabled.</td>
-
- </tr>
-
- <tr valign="top">
- <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1170">CVE-2010-1170</a></td>
- <td class="colMid">8.4, 8.3, 8.2, 8.1, 8.0, 7.4</td>
- <td class="colMid">8.4.4, 8.3.11, 8.2.17, 8.1.21, 8.0.25, 7.4.29</td>
- <td class="colMid">core server, limited deployments</td>
-
- <td class="colMid">C</td>
- <td class="colLast">Insecure permissions on the pltcl_modules table could allow an authenticated user to run arbitrary Tcl code on the
- database server if PL/Tcl is installed and enabled.</td>
- </tr>
-
- <tr valign="top">
- <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4034">CVE-2009-4034</a></td>
- <td class="colMid">8.4, 8.3, 8.2, 8.1, 8.0, 7.4</td>
-
- <td class="colMid">8.4.2, 8.3.9, 8.2.15, 8.1.19, 8.0.23, 7.4.27</td>
- <td class="colMid">client, core server, limited deployments</td>
- <td class="colMid">A</td>
- <td class="colLast">NULL Bytes in SSL Certificates can be used to falsify client or server authentication. This only affects users who have SSL enabled, perform certificate name validation or client certificate authentication, and where the Certificate Authority (CA) has been tricked into issuing invalid certificates. The use of a CA that can be trusted to always issue valid certificates is recommended to ensure you are not vulnerable to this issue.</td>
- </tr>
-
- <tr valign="top">
-
- <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4136">CVE-2009-4136</a></td>
- <td class="colMid">8.4, 8.3, 8.2, 8.1, 8.0, 7.4</td>
- <td class="colMid">8.4.2, 8.3.9, 8.2.15, 8.1.19, 8.0.23, 7.4.27</td>
- <td class="colMid">core server</td>
- <td class="colMid">C</td>
- <td class="colLast">Privilege escalation via changing session state in an index function. This closes a corner case related to vulnerabilities CVE-2009-3230 and CVE-2007-6600 (below).</td>
-
- </tr>
-
- <tr valign="top">
- <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3229">CVE-2009-3229</a></td>
- <td class="colMid">8.4, 8.3, 8.2</td>
- <td class="colMid">8.4.1, 8.3.8, 8.2.14</td>
- <td class="colMid">core server</td>
-
- <td class="colMid">D</td>
- <td class="colLast">Authenticated non-superusers can shut down the backend server by re-LOAD-ing libraries in $libdir/plugins, if any libraries are present there.</td>
- </tr>
-
- <tr valign="top">
- <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3230">CVE-2009-3230</a></td>
- <td class="colMid">8.4, 8.3, 8.2, 8.1, 8.0, 7.4</td>
-
- <td class="colMid">8.4.1, 8.3.8, 8.2.14, 8.1.18, 8.0.22, 7.4.26</td>
- <td class="colMid">core server</td>
- <td class="colMid">C</td>
- <td class="colLast">The fix for issue CVE-2007-6600 (below) failed to include protection against misuse of RESET SESSION AUTHORIZATION.</td>
- </tr>
-
- <tr valign="top">
-
- <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3231">CVE-2009-3231</a></td>
- <td class="colMid">8.3, 8.2</td>
- <td class="colMid">8.3.8, 8.2.14</td>
- <td class="colMid">core server</td>
- <td class="colMid">A</td>
- <td class="colLast">If PostgreSQL is configured with LDAP authentication, and your LDAP configuration allows anonymous binds, it is possible for a user to authenticate themselves with an empty password.</td>
-
- </tr>
-
- <tr valign="top">
- <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0922">CVE-2009-0922</a></td>
- <td class="colMid">8.3, 8.2, 8.1, 8.0, 7.4</td>
- <td class="colMid">8.3.7, 8.2.13, 8.1.17, 8.0.21, 7.4.25</td>
- <td class="colMid">core server</td>
-
- <td class="colMid">D</td>
- <td class="colLast">It is possible to cause a momentary denial of service when there is a failure to convert a localized error message to the client-specified encoding. A valid login is required to exploit this vulnerability.</td>
- </tr>
-
- <tr valign="top">
- <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6600">CVE-2007-6600</a><br/><a href="/about/news.905">Announcement</a></td>
- <td class="colMid">8.2, 8.1, 8.0, 7.4, 7.3</td>
-
- <td class="colMid">8.2.6, 8.1.11, 8.0.15, 7.4.19, 7.3.21</td>
- <td class="colMid">core server</td>
- <td class="colMid">C</td>
- <td class="colLast">Two vulnerabilities in how ANALYZE executes user defined functions that are part of expression indexes allows users to gain superuser privileges. A valid login that has permissions to create functions and tables is required to exploit this vulnearbility.</td>
- </tr>
-
- <tr valign="top">
-
- <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4769">CVE-2007-4769</a><br/><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4772">CVE-2007-4772</a><br/><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6067">CVE-2007-6067</a><br/><a href="/about/news.905">Announcement</a></td>
- <td class="colMid">8.2, 8.1, 8.0, 7.4</td>
- <td class="colMid">8.2.6, 8.1.11, 8.0.15, 7.4.19</td>
- <td class="colMid">core server</td>
- <td class="colMid">B</td>
-
- <td class="colLast">Three vulnearbilities in the regular expression handling libraries can be exploited to cause a backend crash, infinite loops or memory exhaustion. This vulnearbility can be exploited through frontend applications that allow unfiltered regular expressions to be passed in queries.</td>
- </tr>
-
- <tr valign="top">
- <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6601">CVE-2007-6601</a><br/><a href="/about/news.905">Announcement</a></td>
- <td class="colMid">8.2, 8.1, 8.0, 7.4, 7.3</td>
- <td class="colMid">8.2.6, 8.1.11, 8.0.15, 7.4.19, 7.3.21</td>
-
- <td class="colMid">contrib module</td>
- <td class="colMid">C</td>
- <td class="colLast">DBLink functions combined with local trust or ident access control could be used by a malicious user togain superuser privileges. A valid login is required to exploit this vulnerability.</td>
- </tr>
-
- <tr valign="top">
- <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2138">CVE-2007-2138</a><br/><a href="/about/news.791">Announcement</a></td>
-
- <td class="colMid">8.2, 8.1, 8.0, 7.4, 7.3</td>
- <td class="colMid">8.2.4, 8.1.9, 8.0.13, 7.4.17, 7.3.19</td>
- <td class="colMid">core server</td>
- <td class="colMid">C</td>
- <td class="colLast">A vulnerability involving insecure search_path settings allows unprivileged users to gain the SQL privileges of the owner of any SECURITY DEFINER function they are allowed to call. Securing such a function requires both a software update and changes to the function definition.</td>
- </tr>
-
- <tr valign="top">
- <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0556">CVE-2007-0556</a></td>
- <td class="colMid">8.2, 8.1, 8.0</td>
- <td class="colMid">8.2.2, 8.1.7, 8.0.11</td>
- <td class="colMid">core server</td>
- <td class="colMid">C</td>
-
- <td class="colLast">A vulnerability involving changing the data type of a table column can easily be exploited to cause a backend crash, and in principle might be used to read database content that the user should not be able to access.</td>
- </tr>
-
- <tr valign="top">
- <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0555">CVE-2007-0555</a></td>
- <td class="colMid">8.2, 8.1, 8.0, 7.4, 7.3</td>
- <td class="colMid">8.2.2, 8.1.7, 8.0.11, 7.4.16, 7.3.13</td>
-
- <td class="colMid">core server</td>
- <td class="colMid">C</td>
- <td class="colLast">A vulnerability allows suppressing the normal checks that a SQL function returns the data type it's declared to do. These errors can easily be exploited to cause a backend crash, and in principle might be used to read database content that the user should not be able to access.</td>
- </tr>
-
- <tr valign="top">
- <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5542">CVE-2006-5542</a><br/><a href="/about/news.664">Announcement</a></td>
-
- <td class="colMid">8.1</td>
- <td class="colMid">8.1.5</td>
- <td class="colMid">core server</td>
- <td class="colMid">D</td>
- <td class="colLast">A bug in the logging of V3 protocol messages can cause a denial of service. A valid login is required to exploit this vulnerability.</td>
- </tr>
-
- <tr valign="top">
- <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5541">CVE-2006-5541</a><br/><a href="/about/news.664">Announcement</a></td>
- <td class="colMid">8.1, 8.0, 7.4</td>
- <td class="colMid">8.1.5, 8.0.9, 7.4.14</td>
- <td class="colMid">core server</td>
- <td class="colMid">D</td>
-
- <td class="colLast">A bug in the coercion of unknown literals to ANYARRAY can cause a denial of service. A valid login is required to exploit this vulnerability.</td>
- </tr>
-
- <tr valign="top">
- <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5540">CVE-2006-5540</a><br/><a href="/about/news.664">Announcement</a></td>
- <td class="colMid">8.1</td>
- <td class="colMid">8.1.5</td>
-
- <td class="colMid">core server</td>
- <td class="colMid">D</td>
- <td class="colLast">A bug in the handling of aggregates in UPDATE can cause a denial of service. A valid login is required to exploit this vulnerability.</td>
- </tr>
-
- <tr valign="top">
- <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2314">CVE-2006-2314</a><br/><a href="https://wiki.postgresql.org/wiki/8.1.4_et._al._Security_Release_Technical_Info">FAQ</a></td>
-
- <td class="colMid">8.1, 8.0, 7.4, 7.3</td>
- <td class="colMid">8.1.4, 8.0.8, 7.4.13, 7.3.15</td>
- <td class="colMid">core server</td>
- <td class="colMid">A</td>
- <td class="colLast">The widely-used practice of escaping ASCII single quote "'" by turning it into "\'" is unsafe when operating in multibyte encodings that allow 0x5c (ASCII code for backslash) as the trailing byte of a multibyte character.</td>
- </tr>
-
- <tr valign="top">
- <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2313">CVE-2006-2313</a><br/><a href="https://wiki.postgresql.org/wiki/8.1.4_et._al._Security_Release_Technical_Info">FAQ</a></td>
- <td class="colMid">8.1, 8.0, 7.4, 7.3</td>
- <td class="colMid">8.1.4, 8.0.8, 7.4.13, 7.3.15</td>
- <td class="colMid">core server</td>
- <td class="colMid">A</td>
-
- <td class="colLast">An attacker able to submit crafted strings to an application that will embed those strings in SQL commands can use invalidly-encoded multibyte characters to bypass standard string-escaping methods, resulting in possible SQL injection.</td>
- </tr>
-
- <tr valign="top">
- <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0553">CVE-2006-0553</a><br/><a href="/message-id/20060214111455.V60635@ganymede.hub.org">Announcement</a></td>
- <td class="colMid">8.1</td>
- <td class="colMid">8.1.3</td>
-
- <td class="colMid">core server</td>
- <td class="colMid">C</td>
- <td class="colLast">A bug in the handling of SET ROLE allows escalation of privileges to any other database user, including superuser. A valid login is required to exploit this vulnerability.</td>
- </tr>
-
- <tr valign="top">
- <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0678">CVE-2006-0678</a><br/><a href="/message-id/20060214111455.V60635@ganymede.hub.org">Announcement</a></td>
-
- <td class="colMid">8.0, 7.4, 7.3</td>
- <td class="colMid">8.0.7, 7.4.12, 7.3.14</td>
- <td class="colMid">core server</td>
- <td class="colMid">D</td>
- <td class="colLast">A bug in the handling of SET SESSION AUTHORIZATION can cause a backend crash in Assert enabled builds. This will cause the postmaster to restart all backend, resulting in a denial of service. A valid login is required to exploit this vulnerability.</td>
- </tr>
-
- <tr valign="top">
- <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0105">CVE-2006-0105</a><br/><a href="/message-id/20060109022952.F1088@ganymede.hub.org">Announcement</a></td>
- <td class="colMid">8.1, 8.0</td>
- <td class="colMid">8.1.2, 8.0.6</td>
- <td class="colMid">core server, win32 only</td>
- <td class="colMid">B</td>
-
- <td class="colLast">On Windows only, the postmaster will exit if too many connection requests arrive simultaneously. This does not affect existing database connections, but will prevent new connections from being established until the postmaster is manually restarted.</td>
- </tr>
-
- <tr valign="top">
- <td class="colFirst"><a href="/message-id/20060109022952.F1088@ganymede.hub.org">Announcement</a></td>
- <td class="colMid">8.1, 8.0, 7.4, 7.3</td>
- <td class="colMid">8.1.2, 8.0.6, 7.4.11, 7.3.13</td>
-
- <td class="colMid">contrib module</td>
- <td class="colMid"></td>
- <td class="colLast">There is a signedness bug in Openwall gen_salt code that pgcrypto uses. This makes the salt space for md5 and xdes algorithms a lot smaller than it should be. This only affects the gen_salt() function with md5 or xdes.</td>
- </tr>
-
- <tr valign="top">
- <td class="colFirst"><a href="/docs/8.0/static/release-8-0-3.html">Release notes</a></td>
- <td class="colMid">8.0, 7.4</td>
-
- <td class="colMid">8.0.3, 7.4.8</td>
- <td class="colMid">core server</td>
- <td class="colMid">D</td>
- <td class="colLast">Calling COALESCE() with two NULL parameters would cause the current backend to crash, causing a denial of service. A valid login is required to exploit this vulnerability.</td>
- </tr>
-
- <tr valign="top">
-
- <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1410">CVE-2005-1410</a><br/><a href="/message-id/2369.1115064398@sss.pgh.pa.us">Announcement</a></td>
- <td class="colMid">8.0, 7.4</td>
- <td class="colMid">8.0.3, 7.4.8</td>
- <td class="colMid">contrib module</td>
- <td class="colMid">D</td>
- <td class="colLast">The tsearch2 contrib module declares several functions as internal even though they don't take an internal argument. This allows attackers to cause a denial of service and may possibly have other impacts. A valid login is required to exploit this vulnerability.<br/>Note! See the <a href="/message-id/2369.1115064398@sss.pgh.pa.us">announcement</a> for special upgrade instructions.</td>
-
- </tr>
-
- <tr valign="top">
- <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1409">CVE-2005-1409</a><br/><a href="/message-id/2369.1115064398@sss.pgh.pa.us">Announcement</a></td>
- <td class="colMid">8.0, 7.4, 7.3</td>
- <td class="colMid">8.0.3, 7.4.8, 7.3.10</td>
- <td class="colMid">core server</td>
-
- <td class="colMid">D</td>
- <td class="colLast">Public EXECUTE access is given to certain character conversion functions that are not designed to be safe against malicious arguments. This can cause at least a denial of service. A valid login is required to exploit this vulnerability.<br/>Note! See the <a href="/message-id/2369.1115064398@sss.pgh.pa.us">announcement</a> for special upgrade instructions.</td>
- </tr>
-
- <tr valign="top">
- <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0247">CVE-2005-0247</a></td>
-
- <td class="colMid">8.0, 7.4</td>
- <td class="colMid">8.0.2, 7.4.8</td>
- <td class="colMid">core server</td>
- <td class="colMid">C</td>
- <td class="colLast">Multiple buffer overflows in the PL/PGSQL parser may allow attackers to execute arbitrary code. A valid login is required to exploit this vulnerability.</td>
- </tr>
-
- <tr valign="top">
- <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0246">CVE-2005-0246</a></td>
- <td class="colMid">8.0, 7.4, 7.3</td>
- <td class="colMid">8.0.1, 7.4.7, 7.3.9</td>
- <td class="colMid">contrib module</td>
- <td class="colMid">D</td>
-
- <td class="colLast">The intagg contrib module allows attackers to cause a denial of service. A valid login is required to exploit this vulnerability.</td>
- </tr>
-
- <tr valign="top">
- <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0245">CVE-2005-0245</a></td>
- <td class="colMid">8.0, 7.4, 7.3</td>
- <td class="colMid">8.0.1, 7.4.7, 7.3.10</td>
-
- <td class="colMid">core server</td>
- <td class="colMid">C</td>
- <td class="colLast">Multiple buffer overflows in the PL/PGSQL parser may allow attackers to execute arbitrary code. A valid login is required to exploit this vulnerability.</td>
- </tr>
-
- <tr valign="top">
- <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0244">CVE-2005-0244</a></td>
-
- <td class="colMid">8.0, 7.4, 7.3</td>
- <td class="colMid">8.0.1, 7.4.7, 7.3.9</td>
- <td class="colMid">core server</td>
- <td class="colMid">C</td>
- <td class="colLast">EXECUTE permissions are not properly checked when creating aggregates. A valid login is required to exploit this vulnerability.</td>
- </tr>
-
- <tr valign="top">
- <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0227">CVE-2005-0227</a></td>
- <td class="colMid">8.0, 7.4, 7.3</td>
- <td class="colMid">8.0.1, 7.4.7, 7.3.9</td>
- <td class="colMid">core server</td>
- <td class="colMid">C</td>
-
- <td class="colLast">Any database user is permitted to load arbitrary shared libraries using the LOAD command. A valid login is required to exploit this vulnerability.</td>
- </tr>
-
- <tr valign="top">
- <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0977">CVE-2004-0977</a></td>
- <td class="colMid">7.4, 7.3</td>
- <td class="colMid">7.4.6, 7.3.8</td>
-
- <td class="colMid">client contrib module</td>
- <td class="colMid"></td>
- <td class="colLast">Contrib script make_oidjoins_check uses unsafe temporary files. This script is not a user-facing script.</td>
- </tr>
-
- <tr valign="top">
- <td class="colFirst"><a href="/docs/7.4/static/release-7-4-3.html">Release notes</a></td>
- <td class="colMid">7.4</td>
-
- <td class="colMid">7.4.3</td>
- <td class="colMid">core server</td>
- <td class="colMid">C</td>
- <td class="colLast">A buffer overrun vulnerability exists in the enlargeStringInfo function and can be triggered by injecting bogus data in the datastream of an existing connection. A valid login is required to exploit this vulnerability.</td>
- </tr>
</table>
</div>
</table>
</div>
-
{%endblock%}
--- /dev/null
+{%extends "base/page.html"%}
+{%block title%}Security Information Archive{%endblock%}
+{%block contents%}
+
+<h1>Security Information Archive</h1>
+
+<p>
+This page contains a list of vulnerabilities which appear only in versions of PostgreSQL which are
+End Of Life and no longer updated, according to our <a href="/support/versioning">version support policy.</a>
+These versions may contain additional vulnerabilities which are listed on the main
+<a href="/support/security">security page</a>, as well as vulnerabilities which were discovered
+later and have not been patched in those releases.
+</p>
+<p>
+Users still running on unsupported PostgreSQL versions are strongly urged to upgrade
+as soon as possible, as those versions may contain unpatched security vulnerabilities.
+</p>
+<p>
+This page is provided as a security history of the PostgreSQL database. For more information
+about the columns in this table, as well as database and code security, please see
+the main <a href="/support/security">security page</a>.
+</p>
+
+<div class="tblBasic">
+ <table border="0" cellpadding="0" cellspacing="0" class="tblBasicGrey">
+ <tr>
+ <th class="colFirst">Reference</th>
+ <th class="colMid">Affected<br/>versions</th>
+ <th class="colMid">Fixed in</th>
+ <th class="colMid"><a href="#comp">Component</a></th>
+ <th class="colMid"><a href="#cls">Class</a></th>
+ <th class="colLast">Description</th>
+ </tr>
+
+ <tr valign="top">
+ <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1975">CVE-2010-1975</a></td>
+ <td class="colMid">8.4, 8.3, 8.2, 8.1, 8.0, 7.4</td>
+ <td class="colMid">8.4.4, 8.3.11, 8.2.17, 8.1.21, 8.0.25, 7.4.29</td>
+ <td class="colMid">core server</td>
+ <td class="colMid">C</td>
+ <td class="colLast">An unprivileged database user can remove superuser-only
+settings that were applied to his account with ALTER USER by a superuser, thus
+bypassing settings that should be enforced.</td>
+ </tr>
+
+ <tr valign="top">
+ <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1169">CVE-2010-1169</a></td>
+ <td class="colMid">8.4, 8.3, 8.2, 8.1, 8.0, 7.4</td>
+ <td class="colMid">8.4.4, 8.3.11, 8.2.17, 8.1.21, 8.0.25, 7.4.29</td>
+ <td class="colMid">core server, limited deployments</td>
+ <td class="colMid">C</td>
+ <td class="colLast">A vulnerability in Safe.pm and PL/Perl can allow an authenticated user to run arbitrary Perl code on the database
+ server if PL/Perl is installed and enabled.</td>
+
+ </tr>
+
+ <tr valign="top">
+ <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1170">CVE-2010-1170</a></td>
+ <td class="colMid">8.4, 8.3, 8.2, 8.1, 8.0, 7.4</td>
+ <td class="colMid">8.4.4, 8.3.11, 8.2.17, 8.1.21, 8.0.25, 7.4.29</td>
+ <td class="colMid">core server, limited deployments</td>
+
+ <td class="colMid">C</td>
+ <td class="colLast">Insecure permissions on the pltcl_modules table could allow an authenticated user to run arbitrary Tcl code on the
+ database server if PL/Tcl is installed and enabled.</td>
+ </tr>
+
+ <tr valign="top">
+ <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4034">CVE-2009-4034</a></td>
+ <td class="colMid">8.4, 8.3, 8.2, 8.1, 8.0, 7.4</td>
+
+ <td class="colMid">8.4.2, 8.3.9, 8.2.15, 8.1.19, 8.0.23, 7.4.27</td>
+ <td class="colMid">client, core server, limited deployments</td>
+ <td class="colMid">A</td>
+ <td class="colLast">NULL Bytes in SSL Certificates can be used to falsify client or server authentication. This only affects users who have SSL enabled, perform certificate name validation or client certificate authentication, and where the Certificate Authority (CA) has been tricked into issuing invalid certificates. The use of a CA that can be trusted to always issue valid certificates is recommended to ensure you are not vulnerable to this issue.</td>
+ </tr>
+
+ <tr valign="top">
+
+ <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4136">CVE-2009-4136</a></td>
+ <td class="colMid">8.4, 8.3, 8.2, 8.1, 8.0, 7.4</td>
+ <td class="colMid">8.4.2, 8.3.9, 8.2.15, 8.1.19, 8.0.23, 7.4.27</td>
+ <td class="colMid">core server</td>
+ <td class="colMid">C</td>
+ <td class="colLast">Privilege escalation via changing session state in an index function. This closes a corner case related to vulnerabilities CVE-2009-3230 and CVE-2007-6600 (below).</td>
+
+ </tr>
+
+ <tr valign="top">
+ <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3229">CVE-2009-3229</a></td>
+ <td class="colMid">8.4, 8.3, 8.2</td>
+ <td class="colMid">8.4.1, 8.3.8, 8.2.14</td>
+ <td class="colMid">core server</td>
+
+ <td class="colMid">D</td>
+ <td class="colLast">Authenticated non-superusers can shut down the backend server by re-LOAD-ing libraries in $libdir/plugins, if any libraries are present there.</td>
+ </tr>
+
+ <tr valign="top">
+ <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3230">CVE-2009-3230</a></td>
+ <td class="colMid">8.4, 8.3, 8.2, 8.1, 8.0, 7.4</td>
+
+ <td class="colMid">8.4.1, 8.3.8, 8.2.14, 8.1.18, 8.0.22, 7.4.26</td>
+ <td class="colMid">core server</td>
+ <td class="colMid">C</td>
+ <td class="colLast">The fix for issue CVE-2007-6600 (below) failed to include protection against misuse of RESET SESSION AUTHORIZATION.</td>
+ </tr>
+
+ <tr valign="top">
+
+ <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3231">CVE-2009-3231</a></td>
+ <td class="colMid">8.3, 8.2</td>
+ <td class="colMid">8.3.8, 8.2.14</td>
+ <td class="colMid">core server</td>
+ <td class="colMid">A</td>
+ <td class="colLast">If PostgreSQL is configured with LDAP authentication, and your LDAP configuration allows anonymous binds, it is possible for a user to authenticate themselves with an empty password.</td>
+
+ </tr>
+
+ <tr valign="top">
+ <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0922">CVE-2009-0922</a></td>
+ <td class="colMid">8.3, 8.2, 8.1, 8.0, 7.4</td>
+ <td class="colMid">8.3.7, 8.2.13, 8.1.17, 8.0.21, 7.4.25</td>
+ <td class="colMid">core server</td>
+
+ <td class="colMid">D</td>
+ <td class="colLast">It is possible to cause a momentary denial of service when there is a failure to convert a localized error message to the client-specified encoding. A valid login is required to exploit this vulnerability.</td>
+ </tr>
+
+ <tr valign="top">
+ <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6600">CVE-2007-6600</a><br/><a href="/about/news.905">Announcement</a></td>
+ <td class="colMid">8.2, 8.1, 8.0, 7.4, 7.3</td>
+
+ <td class="colMid">8.2.6, 8.1.11, 8.0.15, 7.4.19, 7.3.21</td>
+ <td class="colMid">core server</td>
+ <td class="colMid">C</td>
+ <td class="colLast">Two vulnerabilities in how ANALYZE executes user defined functions that are part of expression indexes allows users to gain superuser privileges. A valid login that has permissions to create functions and tables is required to exploit this vulnearbility.</td>
+ </tr>
+
+ <tr valign="top">
+
+ <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4769">CVE-2007-4769</a><br/><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4772">CVE-2007-4772</a><br/><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6067">CVE-2007-6067</a><br/><a href="/about/news.905">Announcement</a></td>
+ <td class="colMid">8.2, 8.1, 8.0, 7.4</td>
+ <td class="colMid">8.2.6, 8.1.11, 8.0.15, 7.4.19</td>
+ <td class="colMid">core server</td>
+ <td class="colMid">B</td>
+
+ <td class="colLast">Three vulnearbilities in the regular expression handling libraries can be exploited to cause a backend crash, infinite loops or memory exhaustion. This vulnearbility can be exploited through frontend applications that allow unfiltered regular expressions to be passed in queries.</td>
+ </tr>
+
+ <tr valign="top">
+ <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6601">CVE-2007-6601</a><br/><a href="/about/news.905">Announcement</a></td>
+ <td class="colMid">8.2, 8.1, 8.0, 7.4, 7.3</td>
+ <td class="colMid">8.2.6, 8.1.11, 8.0.15, 7.4.19, 7.3.21</td>
+
+ <td class="colMid">contrib module</td>
+ <td class="colMid">C</td>
+ <td class="colLast">DBLink functions combined with local trust or ident access control could be used by a malicious user togain superuser privileges. A valid login is required to exploit this vulnerability.</td>
+ </tr>
+
+ <tr valign="top">
+ <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2138">CVE-2007-2138</a><br/><a href="/about/news.791">Announcement</a></td>
+
+ <td class="colMid">8.2, 8.1, 8.0, 7.4, 7.3</td>
+ <td class="colMid">8.2.4, 8.1.9, 8.0.13, 7.4.17, 7.3.19</td>
+ <td class="colMid">core server</td>
+ <td class="colMid">C</td>
+ <td class="colLast">A vulnerability involving insecure search_path settings allows unprivileged users to gain the SQL privileges of the owner of any SECURITY DEFINER function they are allowed to call. Securing such a function requires both a software update and changes to the function definition.</td>
+ </tr>
+
+ <tr valign="top">
+ <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0556">CVE-2007-0556</a></td>
+ <td class="colMid">8.2, 8.1, 8.0</td>
+ <td class="colMid">8.2.2, 8.1.7, 8.0.11</td>
+ <td class="colMid">core server</td>
+ <td class="colMid">C</td>
+
+ <td class="colLast">A vulnerability involving changing the data type of a table column can easily be exploited to cause a backend crash, and in principle might be used to read database content that the user should not be able to access.</td>
+ </tr>
+
+ <tr valign="top">
+ <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0555">CVE-2007-0555</a></td>
+ <td class="colMid">8.2, 8.1, 8.0, 7.4, 7.3</td>
+ <td class="colMid">8.2.2, 8.1.7, 8.0.11, 7.4.16, 7.3.13</td>
+
+ <td class="colMid">core server</td>
+ <td class="colMid">C</td>
+ <td class="colLast">A vulnerability allows suppressing the normal checks that a SQL function returns the data type it's declared to do. These errors can easily be exploited to cause a backend crash, and in principle might be used to read database content that the user should not be able to access.</td>
+ </tr>
+
+ <tr valign="top">
+ <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5542">CVE-2006-5542</a><br/><a href="/about/news.664">Announcement</a></td>
+
+ <td class="colMid">8.1</td>
+ <td class="colMid">8.1.5</td>
+ <td class="colMid">core server</td>
+ <td class="colMid">D</td>
+ <td class="colLast">A bug in the logging of V3 protocol messages can cause a denial of service. A valid login is required to exploit this vulnerability.</td>
+ </tr>
+
+ <tr valign="top">
+ <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5541">CVE-2006-5541</a><br/><a href="/about/news.664">Announcement</a></td>
+ <td class="colMid">8.1, 8.0, 7.4</td>
+ <td class="colMid">8.1.5, 8.0.9, 7.4.14</td>
+ <td class="colMid">core server</td>
+ <td class="colMid">D</td>
+
+ <td class="colLast">A bug in the coercion of unknown literals to ANYARRAY can cause a denial of service. A valid login is required to exploit this vulnerability.</td>
+ </tr>
+
+ <tr valign="top">
+ <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5540">CVE-2006-5540</a><br/><a href="/about/news.664">Announcement</a></td>
+ <td class="colMid">8.1</td>
+ <td class="colMid">8.1.5</td>
+
+ <td class="colMid">core server</td>
+ <td class="colMid">D</td>
+ <td class="colLast">A bug in the handling of aggregates in UPDATE can cause a denial of service. A valid login is required to exploit this vulnerability.</td>
+ </tr>
+
+ <tr valign="top">
+ <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2314">CVE-2006-2314</a><br/><a href="https://wiki.postgresql.org/wiki/8.1.4_et._al._Security_Release_Technical_Info">FAQ</a></td>
+
+ <td class="colMid">8.1, 8.0, 7.4, 7.3</td>
+ <td class="colMid">8.1.4, 8.0.8, 7.4.13, 7.3.15</td>
+ <td class="colMid">core server</td>
+ <td class="colMid">A</td>
+ <td class="colLast">The widely-used practice of escaping ASCII single quote "'" by turning it into "\'" is unsafe when operating in multibyte encodings that allow 0x5c (ASCII code for backslash) as the trailing byte of a multibyte character.</td>
+ </tr>
+
+ <tr valign="top">
+ <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2313">CVE-2006-2313</a><br/><a href="https://wiki.postgresql.org/wiki/8.1.4_et._al._Security_Release_Technical_Info">FAQ</a></td>
+ <td class="colMid">8.1, 8.0, 7.4, 7.3</td>
+ <td class="colMid">8.1.4, 8.0.8, 7.4.13, 7.3.15</td>
+ <td class="colMid">core server</td>
+ <td class="colMid">A</td>
+
+ <td class="colLast">An attacker able to submit crafted strings to an application that will embed those strings in SQL commands can use invalidly-encoded multibyte characters to bypass standard string-escaping methods, resulting in possible SQL injection.</td>
+ </tr>
+
+ <tr valign="top">
+ <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0553">CVE-2006-0553</a><br/><a href="/message-id/20060214111455.V60635@ganymede.hub.org">Announcement</a></td>
+ <td class="colMid">8.1</td>
+ <td class="colMid">8.1.3</td>
+
+ <td class="colMid">core server</td>
+ <td class="colMid">C</td>
+ <td class="colLast">A bug in the handling of SET ROLE allows escalation of privileges to any other database user, including superuser. A valid login is required to exploit this vulnerability.</td>
+ </tr>
+
+ <tr valign="top">
+ <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0678">CVE-2006-0678</a><br/><a href="/message-id/20060214111455.V60635@ganymede.hub.org">Announcement</a></td>
+
+ <td class="colMid">8.0, 7.4, 7.3</td>
+ <td class="colMid">8.0.7, 7.4.12, 7.3.14</td>
+ <td class="colMid">core server</td>
+ <td class="colMid">D</td>
+ <td class="colLast">A bug in the handling of SET SESSION AUTHORIZATION can cause a backend crash in Assert enabled builds. This will cause the postmaster to restart all backend, resulting in a denial of service. A valid login is required to exploit this vulnerability.</td>
+ </tr>
+
+ <tr valign="top">
+ <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0105">CVE-2006-0105</a><br/><a href="/message-id/20060109022952.F1088@ganymede.hub.org">Announcement</a></td>
+ <td class="colMid">8.1, 8.0</td>
+ <td class="colMid">8.1.2, 8.0.6</td>
+ <td class="colMid">core server, win32 only</td>
+ <td class="colMid">B</td>
+
+ <td class="colLast">On Windows only, the postmaster will exit if too many connection requests arrive simultaneously. This does not affect existing database connections, but will prevent new connections from being established until the postmaster is manually restarted.</td>
+ </tr>
+
+ <tr valign="top">
+ <td class="colFirst"><a href="/message-id/20060109022952.F1088@ganymede.hub.org">Announcement</a></td>
+ <td class="colMid">8.1, 8.0, 7.4, 7.3</td>
+ <td class="colMid">8.1.2, 8.0.6, 7.4.11, 7.3.13</td>
+
+ <td class="colMid">contrib module</td>
+ <td class="colMid"></td>
+ <td class="colLast">There is a signedness bug in Openwall gen_salt code that pgcrypto uses. This makes the salt space for md5 and xdes algorithms a lot smaller than it should be. This only affects the gen_salt() function with md5 or xdes.</td>
+ </tr>
+
+ <tr valign="top">
+ <td class="colFirst"><a href="/docs/8.0/static/release-8-0-3.html">Release notes</a></td>
+ <td class="colMid">8.0, 7.4</td>
+
+ <td class="colMid">8.0.3, 7.4.8</td>
+ <td class="colMid">core server</td>
+ <td class="colMid">D</td>
+ <td class="colLast">Calling COALESCE() with two NULL parameters would cause the current backend to crash, causing a denial of service. A valid login is required to exploit this vulnerability.</td>
+ </tr>
+
+ <tr valign="top">
+
+ <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1410">CVE-2005-1410</a><br/><a href="/message-id/2369.1115064398@sss.pgh.pa.us">Announcement</a></td>
+ <td class="colMid">8.0, 7.4</td>
+ <td class="colMid">8.0.3, 7.4.8</td>
+ <td class="colMid">contrib module</td>
+ <td class="colMid">D</td>
+ <td class="colLast">The tsearch2 contrib module declares several functions as internal even though they don't take an internal argument. This allows attackers to cause a denial of service and may possibly have other impacts. A valid login is required to exploit this vulnerability.<br/>Note! See the <a href="/message-id/2369.1115064398@sss.pgh.pa.us">announcement</a> for special upgrade instructions.</td>
+
+ </tr>
+
+ <tr valign="top">
+ <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1409">CVE-2005-1409</a><br/><a href="/message-id/2369.1115064398@sss.pgh.pa.us">Announcement</a></td>
+ <td class="colMid">8.0, 7.4, 7.3</td>
+ <td class="colMid">8.0.3, 7.4.8, 7.3.10</td>
+ <td class="colMid">core server</td>
+
+ <td class="colMid">D</td>
+ <td class="colLast">Public EXECUTE access is given to certain character conversion functions that are not designed to be safe against malicious arguments. This can cause at least a denial of service. A valid login is required to exploit this vulnerability.<br/>Note! See the <a href="/message-id/2369.1115064398@sss.pgh.pa.us">announcement</a> for special upgrade instructions.</td>
+ </tr>
+
+ <tr valign="top">
+ <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0247">CVE-2005-0247</a></td>
+
+ <td class="colMid">8.0, 7.4</td>
+ <td class="colMid">8.0.2, 7.4.8</td>
+ <td class="colMid">core server</td>
+ <td class="colMid">C</td>
+ <td class="colLast">Multiple buffer overflows in the PL/PGSQL parser may allow attackers to execute arbitrary code. A valid login is required to exploit this vulnerability.</td>
+ </tr>
+
+ <tr valign="top">
+ <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0246">CVE-2005-0246</a></td>
+ <td class="colMid">8.0, 7.4, 7.3</td>
+ <td class="colMid">8.0.1, 7.4.7, 7.3.9</td>
+ <td class="colMid">contrib module</td>
+ <td class="colMid">D</td>
+
+ <td class="colLast">The intagg contrib module allows attackers to cause a denial of service. A valid login is required to exploit this vulnerability.</td>
+ </tr>
+
+ <tr valign="top">
+ <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0245">CVE-2005-0245</a></td>
+ <td class="colMid">8.0, 7.4, 7.3</td>
+ <td class="colMid">8.0.1, 7.4.7, 7.3.10</td>
+
+ <td class="colMid">core server</td>
+ <td class="colMid">C</td>
+ <td class="colLast">Multiple buffer overflows in the PL/PGSQL parser may allow attackers to execute arbitrary code. A valid login is required to exploit this vulnerability.</td>
+ </tr>
+
+ <tr valign="top">
+ <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0244">CVE-2005-0244</a></td>
+
+ <td class="colMid">8.0, 7.4, 7.3</td>
+ <td class="colMid">8.0.1, 7.4.7, 7.3.9</td>
+ <td class="colMid">core server</td>
+ <td class="colMid">C</td>
+ <td class="colLast">EXECUTE permissions are not properly checked when creating aggregates. A valid login is required to exploit this vulnerability.</td>
+ </tr>
+
+ <tr valign="top">
+ <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0227">CVE-2005-0227</a></td>
+ <td class="colMid">8.0, 7.4, 7.3</td>
+ <td class="colMid">8.0.1, 7.4.7, 7.3.9</td>
+ <td class="colMid">core server</td>
+ <td class="colMid">C</td>
+
+ <td class="colLast">Any database user is permitted to load arbitrary shared libraries using the LOAD command. A valid login is required to exploit this vulnerability.</td>
+ </tr>
+
+ <tr valign="top">
+ <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0977">CVE-2004-0977</a></td>
+ <td class="colMid">7.4, 7.3</td>
+ <td class="colMid">7.4.6, 7.3.8</td>
+
+ <td class="colMid">client contrib module</td>
+ <td class="colMid"></td>
+ <td class="colLast">Contrib script make_oidjoins_check uses unsafe temporary files. This script is not a user-facing script.</td>
+ </tr>
+
+ <tr valign="top">
+ <td class="colFirst"><a href="/docs/7.4/static/release-7-4-3.html">Release notes</a></td>
+ <td class="colMid">7.4</td>
+
+ <td class="colMid">7.4.3</td>
+ <td class="colMid">core server</td>
+ <td class="colMid">C</td>
+ <td class="colLast">A buffer overrun vulnerability exists in the enlargeStringInfo function and can be triggered by injecting bogus data in the datastream of an existing connection. A valid login is required to exploit this vulnerability.</td>
+ </tr>
+ </table>
+</div>
+
+{%endblock%}