Ubuntu 6.06 LTS / 6.10 / 7.04 / 7.10 : postgresql vulnerabilities (USN-568-1)

Ubuntu Security Notice (C) 2008-2016 Canonical, Inc. / NASL script (C) 2008-2016 Tenable Network Security, Inc.

Synopsis :

The remote Ubuntu host is missing one or more security-related patches.

Description :

Nico Leidecker discovered that PostgreSQL did not properly restrict
dblink functions. An authenticated user could exploit this flaw to
access arbitrary accounts and execute arbitrary SQL queries.
(CVE-2007-3278, CVE-2007-6601)

It was discovered that the TCL regular expression parser used by
PostgreSQL did not properly check its input. An attacker could send
crafted regular expressions to PostgreSQL and cause a denial of
service via resource exhaustion or database crash. (CVE-2007-4769,
CVE-2007-4772, CVE-2007-6067)

It was discovered that PostgreSQL executed VACUUM and ANALYZE
operations within index functions with superuser privileges and also
allowed SET ROLE and SET SESSION AUTHORIZATION within index functions.
A remote authenticated user could exploit these flaws to gain
privileges. (CVE-2007-6600).

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.2
CVSS Temporal Score : 7.2
Public Exploit Available : false

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 29978 ()

Bugtraq ID:

CVE ID: CVE-2007-3278