How to Buy
This script is Copyright (C) 2004-2016 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
Updated PostgreSQL packages that correct a buffer overflow in the
to_ascii routines are now available.
PostgreSQL is an advanced Object-Relational database management system
Two bugs that can lead to buffer overflows have been found in the
PostgreSQL abstract data type to ASCII conversion routines. A remote
attacker who is able to influence the data passed to the to_ascii
functions may be able to execute arbitrary code in the context of the
PostgreSQL server. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CVE-2003-0901 to these issues.
In addition, a bug that can lead to leaks has been found in the string
to timestamp abstract data type conversion routine. If the input
string to the to_timestamp() routine is shorter than what the template
string is expecting, the routine will run off the end of the input
string, resulting in a leak and unstable behaviour.
Users of PostgreSQL are advised to upgrade to these erratum packages,
which contain a backported patch that corrects these issues.
See also :
Update the affected packages.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.2
Public Exploit Available : true
Family: Red Hat Local Security Checks
Nessus Plugin ID: 12430 ()
Bugtraq ID: 8741
CVE ID: CVE-2003-0901
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.