From 7812369535b040bfe8e8c4a868ac850823f023c2 Mon Sep 17 00:00:00 2001 From: Magnus Hagander Date: Fri, 26 Jan 2018 11:20:19 +0100 Subject: [PATCH] Activate new security pages This also removes the two previous static pages for this information. Access to the old "security archives" URL is now redirected back to the main security page, since the archive is replaced with a dynamically built of per-version security patches. --- pgweb/urls.py | 4 + templates/pages/support/security.html | 448 --------------- templates/pages/support/security_archive.html | 520 ------------------ 3 files changed, 4 insertions(+), 968 deletions(-) delete mode 100644 templates/pages/support/security.html delete mode 100644 templates/pages/support/security_archive.html diff --git a/pgweb/urls.py b/pgweb/urls.py index 9380b31a..8eb2c4fe 100644 --- a/pgweb/urls.py +++ b/pgweb/urls.py @@ -59,6 +59,10 @@ urlpatterns = patterns('', (r'^search/$', 'pgweb.search.views.search'), + (r'^support/security/$', 'pgweb.security.views.index'), + (r'^support/security/([\d\.]+)/$', 'pgweb.security.views.version'), + (r'^support/security_archive/$', RedirectView.as_view(url='/support/security/')), + (r'^support/professional_(support|hosting)/$', 'pgweb.profserv.views.root'), (r'^support/professional_(support|hosting)[/_](.*)/$', 'pgweb.profserv.views.region'), (r'^account/submitbug/$', 'pgweb.misc.views.submitbug'), diff --git a/templates/pages/support/security.html b/templates/pages/support/security.html deleted file mode 100644 index f49fbd39..00000000 --- a/templates/pages/support/security.html +++ /dev/null @@ -1,448 +0,0 @@ -{%extends "base/page.html"%} -{%block title%}Security Information{%endblock%} -{%block contents%} - -

Security Information

- -

-If you wish to report a new security vulnerability in PostgreSQL, please -send an email to -security@postgresql.org. -For reporting non-security bugs, please see the Report a Bug page. -

- -

- -The PostgreSQL Global Development Group (PGDG) takes security seriously, -allowing our users to place their trust in the web sites and applications -built around PostgreSQL. Our approach covers fail-safe configuration options, -a secure and robust database server as well as good integration with other -security infrastructure software. -

- -

-PostgreSQL security updates are primarily made available as minor version -upgrades. You are always advised to use the latest minor version available, -as it will likely also contain other non-security related fixes. All known -security issues are always fixed in the next major release, when it comes out. -

- -

-PGDG believes that accuracy, completeness and availability of security -information is essential for our users. We choose to pool all information on -this one page, allowing easy searching for vulnerabilities by a range of -criteria. -

- -

-The following table lists all known security issues. -Please note that versions prior to 9.3 are no longer -supported. An archive of vulnerabilities found only in unsupported -versions is -on our Security Archive page, -but vulnerability information on those versions is no longer updated, -nor are vulnerabilities patched. -

- -

-Vulnerabilities list which major releases they were present -in, and which version they are fixed in for each. If the vulnerability -was exploitable without a valid login, this is also stated. They also -list a vulnerability class, but we urge all users to read the description -to determine if the bug affects specific installations or not. -

- -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ReferenceAffected
versions
Fixed inComponentClassDescription
CVE-2017-150999.5-1010.1, 9.6.6, 9.5.10core serverCINSERT ... ON CONFLICT DO UPDATE fails to enforce SELECT privileges
CVE-2017-150989.3-1010.1, 9.6.6, 9.5.10, 9.4.15, 9.3.20core serverCMemory disclosure in JSON functions
CVE-2017-121729.2-1010.1, 9.6.6, 9.5.10, 9.4.15, 9.3.20, 9.2.24contrib moduleAStart scripts permit database administrator to modify root-owned files
CVE-2017-75489.4-9.69.6.4, 9.5.8, 9.4.13core serverClo_put() function ignores ACLs
CVE-2017-75479.2-9.69.6.4, 9.5.8, 9.4.13, 9.3.18, 9.2.22core serverCpg_user_mappings view discloses passwords to users lacking server privileges
CVE-2017-75469.2-9.69.6.4, 9.5.8, 9.4.13, 9.3.18, 9.2.22core serverAempty password accepted in some authentication methods
CVE-2017-74849.2-9.69.6.3, 9.5.7, 9.4.12, 9.3.17, 9.2.21core serverCselectivity estimators bypass SELECT privilege checks
CVE-2017-74859.3-9.69.6.3, 9.5.7, 9.4.12, 9.3.17clientAlibpq ignores PGREQUIRESSL environment variable
CVE-2017-74869.2-9.69.6.3, 9.5.7, 9.4.12, 9.3.17, 9.2.21core serverCpg_user_mappings view discloses foreign server passwords
CVE-2016-70489.1-9.59.5.5, 9.4.10, 9.3.15, 9.2.19, 9.1.24packagingAInteractive installer downloads software over plain HTTP, then executes it
CVE-2016-54239.5, 9.4, 9.3, 9.2, 9.19.5.4, 9.4.9, 9.3.14, 9.2.18, 9.1.23core serverCCertain nested CASE/WHEN expressions can crash server
CVE-2016-54249.5, 9.4, 9.3, 9.2, 9.19.5.4, 9.4.9, 9.3.14, 9.2.18, 9.1.23clientCExceptional database and role names could enable escalation to superuser
CVE-2016-21939.59.5.2core serverCPlan cache might use wrong role context for RLS policy
CVE-2016-30659.59.5.2contribCpageinspect does not check permissions for BRIN indexes
CVE-2016-07739.5, 9.4, 9.3, 9.2, 9.19.5.1, 9.4.6, 9.3.11, 9.2.15, 9.1.20core serverCUnchecked regex can crash the server
CVE-2015-52899.4, 9.39.4.5, 9.3.10core serverBUnchecked JSON input can crash the server
CVE-2015-52889.4, 9.3, 9.2, 9.1, 9.09.4.5, 9.3.10, 9.2.14, 9.1.19, 9.0.23contrib moduleCMemory leak in crypt() function.
CVE-2015-31659.4, 9.3, 9.2, 9.1, 9.09.4.2, 9.3.7, 9.2.11, 9.1.16, 9.0.20core serverBDouble "free" after authentication timeout
CVE-2015-31669.4, 9.3, 9.2, 9.1, 9.09.4.2, 9.3.7, 9.2.11, 9.1.16, 9.0.20core server, clientDUnanticipated errors from the standard library.
CVE-2015-31679.4, 9.3, 9.2, 9.1, 9.09.4.2, 9.3.7, 9.2.11, 9.1.16, 9.0.20contrib moduleCpgcrypto has multiple error messages for decryption with an incorrect key.
CVE-2015-02419.4, 9.3, 9.2, 9.1, 9.09.4.1, 9.3.6, 9.2.10, 9.1.15, 9.0.19core serverCBuffer overruns in "to_char" functions.
CVE-2015-02429.4, 9.3, 9.2, 9.1, 9.09.4.1, 9.3.6, 9.2.10, 9.1.15, 9.0.19core serverCBuffer overrun in replacement printf family of functions.
CVE-2015-02439.4, 9.3, 9.2, 9.1, 9.09.4.1, 9.3.6, 9.2.10, 9.1.15, 9.0.19contrib moduleCMemory errors in functions in the pgcrypto extension.
CVE-2015-02449.4, 9.3, 9.2, 9.1, 9.09.4.1, 9.3.6, 9.2.10, 9.1.15, 9.0.19core serverCAn error in extended protocol message reading.
CVE-2014-81619.4, 9.3, 9.2, 9.1, 9.09.4.1, 9.3.6, 9.2.10, 9.1.15, 9.0.19core serverCConstraint violation errors can cause display of values in columns which the user would not normally have rights to see.
CVE-2014-00679.4, 9.3, 9.2, 9.1, 9.09.4.1, 9.3.6, 9.2.10, 9.1.15, 9.0.19otherN/AUnauthenticated users may gain access to the database server during "make check". Details.
CVE-2014-00609.3, 9.2, 9.1, 9.0, 8.49.3.3, 9.2.7, 9.1.12, 9.0.16, 8.4.20core serverCSET ROLE bypasses lack of ADMIN OPTION. Details
CVE-2014-00619.3, 9.2, 9.1, 9.0, 8.49.3.3, 9.2.7, 9.1.12, 9.0.16, 8.4.20core serverCPrivilege escalation via calls to validator functions. Details
CVE-2014-00629.3, 9.2, 9.1, 9.0, 8.49.3.3, 9.2.7, 9.1.12, 9.0.16, 8.4.20core serverCRace condition in CREATE INDEX allows for privilege escalation. Details
CVE-2014-00639.3, 9.2, 9.1, 9.0, 8.49.3.3, 9.2.7, 9.1.12, 9.0.16, 8.4.20core server, ECPGCPotential buffer overruns in datetime input/output. Details
CVE-2014-00649.3, 9.2, 9.1, 9.0, 8.49.3.3, 9.2.7, 9.1.12, 9.0.16, 8.4.20core server, contribCPotential buffer overruns due to integer overflow in size calculations. Details
CVE-2014-00659.3, 9.2, 9.1, 9.0, 8.49.3.3, 9.2.7, 9.1.12, 9.0.16, 8.4.20core serverCPotential buffer overruns of fixed-size buffers. Details
CVE-2014-00669.3, 9.2, 9.1, 9.0, 8.49.3.3, 9.2.7, 9.1.12, 9.0.16, 8.4.20contrib moduleDPotential null pointer dereference crash when crypt(3) returns NULL. Details
-
- - -

Vulnerability Classes

-

-The following vulnerability class references are used in the above table: -

- -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ClassDescription
AA vulnerability that is exploitable for privilege escalation without requiring a prior login.
BA vulnerability that is exploitable for denial-of-service without requiring a prior login.
CA vulnerabilty that is exploitable for privilege escalation, but requiring a valid prior login.
DA vulnerability that is exploitable for denial-of-service, but requiring a valid prior login.
- -
- - -

Components

-

-The following component references are used in the above table: -

- -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ComponentDescription
core serverThis vulnerability exists in the core server product.
clientThis vulnerability exists in a client library or client application only.
contrib moduleThis vulnerability exists in a contrib module. Contrib modules are not installed by default when PostgreSQL is installed from source. They may be installed by binary packages.
client contrib moduleThis vulnerability exists in a contrib module used on the client only.
packagingThis vulnerability exists in PostgreSQL binary packaging, e.g. an installer or RPM.
-
- -{%endblock%} diff --git a/templates/pages/support/security_archive.html b/templates/pages/support/security_archive.html deleted file mode 100644 index 79d2b2cc..00000000 --- a/templates/pages/support/security_archive.html +++ /dev/null @@ -1,520 +0,0 @@ -{%extends "base/page.html"%} -{%block title%}Security Information Archive{%endblock%} -{%block contents%} - -

Security Information Archive

- -

-This page contains a list of vulnerabilities which appear only in versions of PostgreSQL which are -End Of Life and no longer updated, according to our version support policy. -These versions may contain additional vulnerabilities which are listed on the main -security page, as well as vulnerabilities which were discovered -later and have not been patched in those releases. -

-

-Users still running on unsupported PostgreSQL versions are strongly urged to upgrade -as soon as possible, as those versions may contain unpatched security vulnerabilities. -

-

-This page is provided as a security history of the PostgreSQL database. For more information -about the columns in this table, as well as database and code security, please see -the main security page. -

- -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ReferenceAffected
versions
Fixed inComponentClassDescription
CVE-2013-18999.2, 9.1, 9.09.2.4, 9.1.9, 9.0.13core serverAA connection request containing a database name that begins with "-" may be crafted to damage or destroy files within a server's data directory
CVE-2013-19009.2, 9.1, 9.0, 8.49.2.4, 9.1.9, 9.0.13, 8.4.17contrib moduleCRandom numbers generated by contrib/pgcrypto functions may be easy for another database user to guess
CVE-2013-19019.2, 9.19.2.4, 9.1.9core serverDAn unprivileged user can run commands that could interfere with in-progress backups.
CVE-2013-19029.2, 9.1, 9.0, 8.4, 8.39.2.4-1, 9.1.9-1, 9.0.13-1, 8.4.17-1, 8.3.23-3packagingCEnterpriseDB's installers for Linux and Mac OS X created a directory and file in /tmp with predictable names.
CVE-2013-19039.2, 9.1, 9.0, 8.4, 8.39.2.4-1, 9.1.9-1, 9.0.13-1, 8.4.17-1, 8.3.23-3packagingCEnterpriseDB's installers for Linux and Mac OS X passed the database superuser password to a script in an insecure fashion.
CVE-2013-02559.2, 9.1, 9.0, 8.4, 8.39.2.3, 9.1.8, 9.0.12, 8.4.16, 8.3.23core serverDexecuting enum_recv() with wrong parameters crashes server
CVE-2012-34899.1, 9.0, 8.4, 8.39.1.5, 9.0.9, 8.4.13, 8.3.20core serverCxml_parse() DTD validation can be used to read arbitrary files
CVE-2012-34889.1, 9.0, 8.4, 8.39.1.5, 9.0.9, 8.4.13, 8.3.20contrib moduleCcontrib/xml2's xslt_process() can be used to read and write arbitrary files
CVE-2012-21439.1, 9.0, 8.4, 8.39.1.4, 9.0.8, 8.4.12, 8.3.19contrib moduleCPasswords containing the byte 0x80 passed to the crypt() function in pgcrypto are incorrectly truncated if DES encryption was used
CVE-2012-26559.1, 9.0, 8.4, 8.39.1.4, 9.0.8, 8.4.12, 8.3.19core serverDSECURITY DEFINER and SET attributes on procedural call handlers are not ignored and can be used to crash the server
CVE-2012-08669.1, 9.0, 8.4, 8.39.1.3, 9.0.7, 8.4.11, 8.3.18core serverCPermissions on a function called by a trigger are not properly checked.
CVE-2012-08679.1, 9.0, 8.49.1.3, 9.0.7, 8.4.11core server, limited deploymentsASSL certificate name checks are truncated to 32 characters, allowing connection spoofing under some circumstances when using third party certificate authorities.
CVE-2012-08689.1, 9.0, 8.4, 8.39.1.3, 9.0.7, 8.4.11, 8.3.18core serverCLine breaks in object names can be exploited to execute arbitrary SQL when reloading a pg_dump file.
CVE-2010-40159.0, 8.4, 8.3, 8.2 9.0.3, 8.4.7, 8.3.14, 8.2.20contrib moduleCAn authenticated database user can cause a buffer overrun by calling functions from the intarray optional module with certain parameters.
CVE-2010-34339.0, 8.4, 8.3, 8.2, 8.1, 8.0, 7.49.0.1, 8.4.5, 8.3.12, 8.2.18, 8.1.22, 8.0.26, 7.4.30core serverCAn authenticated database user can manipulate modules and tied variables in some external procedural languages to execute code with enhanced privileges.Details
CVE-2010-19758.4, 8.3, 8.2, 8.1, 8.0, 7.48.4.4, 8.3.11, 8.2.17, 8.1.21, 8.0.25, 7.4.29core serverCAn unprivileged database user can remove superuser-only -settings that were applied to his account with ALTER USER by a superuser, thus -bypassing settings that should be enforced.
CVE-2010-11698.4, 8.3, 8.2, 8.1, 8.0, 7.48.4.4, 8.3.11, 8.2.17, 8.1.21, 8.0.25, 7.4.29core server, limited deploymentsCA vulnerability in Safe.pm and PL/Perl can allow an authenticated user to run arbitrary Perl code on the database - server if PL/Perl is installed and enabled.
CVE-2010-11708.4, 8.3, 8.2, 8.1, 8.0, 7.48.4.4, 8.3.11, 8.2.17, 8.1.21, 8.0.25, 7.4.29core server, limited deploymentsCInsecure permissions on the pltcl_modules table could allow an authenticated user to run arbitrary Tcl code on the - database server if PL/Tcl is installed and enabled.
CVE-2009-40348.4, 8.3, 8.2, 8.1, 8.0, 7.48.4.2, 8.3.9, 8.2.15, 8.1.19, 8.0.23, 7.4.27client, core server, limited deploymentsANULL Bytes in SSL Certificates can be used to falsify client or server authentication. This only affects users who have SSL enabled, perform certificate name validation or client certificate authentication, and where the Certificate Authority (CA) has been tricked into issuing invalid certificates. The use of a CA that can be trusted to always issue valid certificates is recommended to ensure you are not vulnerable to this issue.
CVE-2009-41368.4, 8.3, 8.2, 8.1, 8.0, 7.48.4.2, 8.3.9, 8.2.15, 8.1.19, 8.0.23, 7.4.27core serverCPrivilege escalation via changing session state in an index function. This closes a corner case related to vulnerabilities CVE-2009-3230 and CVE-2007-6600 (below).
CVE-2009-32298.4, 8.3, 8.28.4.1, 8.3.8, 8.2.14core serverDAuthenticated non-superusers can shut down the backend server by re-LOAD-ing libraries in $libdir/plugins, if any libraries are present there.
CVE-2009-32308.4, 8.3, 8.2, 8.1, 8.0, 7.48.4.1, 8.3.8, 8.2.14, 8.1.18, 8.0.22, 7.4.26core serverCThe fix for issue CVE-2007-6600 (below) failed to include protection against misuse of RESET SESSION AUTHORIZATION.
CVE-2009-32318.3, 8.28.3.8, 8.2.14core serverAIf PostgreSQL is configured with LDAP authentication, and your LDAP configuration allows anonymous binds, it is possible for a user to authenticate themselves with an empty password.
CVE-2009-09228.3, 8.2, 8.1, 8.0, 7.48.3.7, 8.2.13, 8.1.17, 8.0.21, 7.4.25core serverDIt is possible to cause a momentary denial of service when there is a failure to convert a localized error message to the client-specified encoding. A valid login is required to exploit this vulnerability.
CVE-2007-6600
Announcement
8.2, 8.1, 8.0, 7.4, 7.38.2.6, 8.1.11, 8.0.15, 7.4.19, 7.3.21core serverCTwo vulnerabilities in how ANALYZE executes user defined functions that are part of expression indexes allows users to gain superuser privileges. A valid login that has permissions to create functions and tables is required to exploit this vulnearbility.
CVE-2007-4769
CVE-2007-4772
CVE-2007-6067
Announcement
8.2, 8.1, 8.0, 7.48.2.6, 8.1.11, 8.0.15, 7.4.19core serverBThree vulnearbilities in the regular expression handling libraries can be exploited to cause a backend crash, infinite loops or memory exhaustion. This vulnearbility can be exploited through frontend applications that allow unfiltered regular expressions to be passed in queries.
CVE-2007-6601
Announcement
8.2, 8.1, 8.0, 7.4, 7.38.2.6, 8.1.11, 8.0.15, 7.4.19, 7.3.21contrib moduleCDBLink functions combined with local trust or ident access control could be used by a malicious user togain superuser privileges. A valid login is required to exploit this vulnerability.
CVE-2007-2138
Announcement
8.2, 8.1, 8.0, 7.4, 7.38.2.4, 8.1.9, 8.0.13, 7.4.17, 7.3.19core serverCA vulnerability involving insecure search_path settings allows unprivileged users to gain the SQL privileges of the owner of any SECURITY DEFINER function they are allowed to call. Securing such a function requires both a software update and changes to the function definition.
CVE-2007-05568.2, 8.1, 8.08.2.2, 8.1.7, 8.0.11core serverCA vulnerability involving changing the data type of a table column can easily be exploited to cause a backend crash, and in principle might be used to read database content that the user should not be able to access.
CVE-2007-05558.2, 8.1, 8.0, 7.4, 7.38.2.2, 8.1.7, 8.0.11, 7.4.16, 7.3.13core serverCA vulnerability allows suppressing the normal checks that a SQL function returns the data type it's declared to do. These errors can easily be exploited to cause a backend crash, and in principle might be used to read database content that the user should not be able to access.
CVE-2006-5542
Announcement
8.18.1.5core serverDA bug in the logging of V3 protocol messages can cause a denial of service. A valid login is required to exploit this vulnerability.
CVE-2006-5541
Announcement
8.1, 8.0, 7.48.1.5, 8.0.9, 7.4.14core serverDA bug in the coercion of unknown literals to ANYARRAY can cause a denial of service. A valid login is required to exploit this vulnerability.
CVE-2006-5540
Announcement
8.18.1.5core serverDA bug in the handling of aggregates in UPDATE can cause a denial of service. A valid login is required to exploit this vulnerability.
CVE-2006-2314
FAQ
8.1, 8.0, 7.4, 7.38.1.4, 8.0.8, 7.4.13, 7.3.15core serverAThe widely-used practice of escaping ASCII single quote "'" by turning it into "\'" is unsafe when operating in multibyte encodings that allow 0x5c (ASCII code for backslash) as the trailing byte of a multibyte character.
CVE-2006-2313
FAQ
8.1, 8.0, 7.4, 7.38.1.4, 8.0.8, 7.4.13, 7.3.15core serverAAn attacker able to submit crafted strings to an application that will embed those strings in SQL commands can use invalidly-encoded multibyte characters to bypass standard string-escaping methods, resulting in possible SQL injection.
CVE-2006-0553
Announcement
8.18.1.3core serverCA bug in the handling of SET ROLE allows escalation of privileges to any other database user, including superuser. A valid login is required to exploit this vulnerability.
CVE-2006-0678
Announcement
8.0, 7.4, 7.38.0.7, 7.4.12, 7.3.14core serverDA bug in the handling of SET SESSION AUTHORIZATION can cause a backend crash in Assert enabled builds. This will cause the postmaster to restart all backend, resulting in a denial of service. A valid login is required to exploit this vulnerability.
CVE-2006-0105
Announcement
8.1, 8.08.1.2, 8.0.6core server, win32 onlyBOn Windows only, the postmaster will exit if too many connection requests arrive simultaneously. This does not affect existing database connections, but will prevent new connections from being established until the postmaster is manually restarted.
Announcement8.1, 8.0, 7.4, 7.38.1.2, 8.0.6, 7.4.11, 7.3.13contrib moduleThere is a signedness bug in Openwall gen_salt code that pgcrypto uses. This makes the salt space for md5 and xdes algorithms a lot smaller than it should be. This only affects the gen_salt() function with md5 or xdes.
Release notes8.0, 7.48.0.3, 7.4.8core serverDCalling COALESCE() with two NULL parameters would cause the current backend to crash, causing a denial of service. A valid login is required to exploit this vulnerability.
CVE-2005-1410
Announcement
8.0, 7.48.0.3, 7.4.8contrib moduleDThe tsearch2 contrib module declares several functions as internal even though they don't take an internal argument. This allows attackers to cause a denial of service and may possibly have other impacts. A valid login is required to exploit this vulnerability.
Note! See the announcement for special upgrade instructions.
CVE-2005-1409
Announcement
8.0, 7.4, 7.38.0.3, 7.4.8, 7.3.10core serverDPublic EXECUTE access is given to certain character conversion functions that are not designed to be safe against malicious arguments. This can cause at least a denial of service. A valid login is required to exploit this vulnerability.
Note! See the announcement for special upgrade instructions.
CVE-2005-02478.0, 7.48.0.2, 7.4.8core serverCMultiple buffer overflows in the PL/PGSQL parser may allow attackers to execute arbitrary code. A valid login is required to exploit this vulnerability.
CVE-2005-02468.0, 7.4, 7.38.0.1, 7.4.7, 7.3.9contrib moduleDThe intagg contrib module allows attackers to cause a denial of service. A valid login is required to exploit this vulnerability.
CVE-2005-02458.0, 7.4, 7.38.0.1, 7.4.7, 7.3.10core serverCMultiple buffer overflows in the PL/PGSQL parser may allow attackers to execute arbitrary code. A valid login is required to exploit this vulnerability.
CVE-2005-02448.0, 7.4, 7.38.0.1, 7.4.7, 7.3.9core serverCEXECUTE permissions are not properly checked when creating aggregates. A valid login is required to exploit this vulnerability.
CVE-2005-02278.0, 7.4, 7.38.0.1, 7.4.7, 7.3.9core serverCAny database user is permitted to load arbitrary shared libraries using the LOAD command. A valid login is required to exploit this vulnerability.
CVE-2004-09777.4, 7.37.4.6, 7.3.8client contrib moduleContrib script make_oidjoins_check uses unsafe temporary files. This script is not a user-facing script.
Release notes7.47.4.3core serverCA buffer overrun vulnerability exists in the enlargeStringInfo function and can be triggered by injecting bogus data in the datastream of an existing connection. A valid login is required to exploit this vulnerability.
-
- -{%endblock%} -- 2.39.5