Ubuntu 6.06 LTS / 6.10 / 7.04 / 7.10 : postgresql vulnerabilities (USN-568-1)

Ubuntu Security Notice (C) 2008-2013 Canonical, Inc. / NASL script (C) 2008-2013 Tenable Network Security, Inc.


Synopsis :

The remote Ubuntu host is missing one or more security-related patches.

Description :

Nico Leidecker discovered that PostgreSQL did not properly restrict
dblink functions. An authenticated user could exploit this flaw to
access arbitrary accounts and execute arbitrary SQL queries.
(CVE-2007-3278, CVE-2007-6601)

It was discovered that the TCL regular expression parser used by
PostgreSQL did not properly check its input. An attacker could send
crafted regular expressions to PostgreSQL and cause a denial of
service via resource exhaustion or database crash. (CVE-2007-4769,
CVE-2007-4772, CVE-2007-6067)

It was discovered that PostgreSQL executed VACUUM and ANALYZE
operations within index functions with superuser privileges and also
allowed SET ROLE and SET SESSION AUTHORIZATION within index functions.
A remote authenticated user could exploit these flaws to gain
privileges. (CVE-2007-6600).

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.2
(CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 29978 ()

Bugtraq ID:

CVE ID: CVE-2007-3278
CVE-2007-4769
CVE-2007-4772
CVE-2007-6067
CVE-2007-6600
CVE-2007-6601