RHEL 2.1 : postgresql (RHSA-2003:314)

This script is Copyright (C) 2004-2014 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated PostgreSQL packages that correct a buffer overflow in the
to_ascii routines are now available.

PostgreSQL is an advanced Object-Relational database management system
(DBMS).

Two bugs that can lead to buffer overflows have been found in the
PostgreSQL abstract data type to ASCII conversion routines. A remote
attacker who is able to influence the data passed to the to_ascii
functions may be able to execute arbitrary code in the context of the
PostgreSQL server. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CVE-2003-0901 to these issues.

In addition, a bug that can lead to leaks has been found in the string
to timestamp abstract data type conversion routine. If the input
string to the to_timestamp() routine is shorter than what the template
string is expecting, the routine will run off the end of the input
string, resulting in a leak and unstable behaviour.

Users of PostgreSQL are advised to upgrade to these erratum packages,
which contain a backported patch that corrects these issues.

See also :

https://www.redhat.com/security/data/cve/CVE-2003-0901.html
http://archives.postgresql.org/pgsql-bugs/2003-09/msg00014.php
http://rhn.redhat.com/errata/RHSA-2003-314.html

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 6.2
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Red Hat Local Security Checks

Nessus Plugin ID: 12430 ()

Bugtraq ID: 8741

CVE ID: CVE-2003-0901