This script is Copyright (C) 2009-2014 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
Updated postgresql packages that fix two security issues are now
available for Red Hat Enterprise Linux 4 and 5.
This update has been rated as having moderate security impact by the
Red Hat Security Response Team.
PostgreSQL is an advanced object-relational database management system
It was discovered that the upstream patch for CVE-2007-6600 included
in the Red Hat Security Advisory RHSA-2008:0038 did not include
protection against misuse of the RESET ROLE and RESET SESSION
AUTHORIZATION commands. An authenticated user could use this flaw to
install malicious code that would later execute with superuser
A flaw was found in the way PostgreSQL handled encoding conversion. A
remote, authenticated user could trigger an encoding conversion
failure, possibly leading to a temporary denial of service. Note: To
exploit this issue, a locale and client encoding for which specific
messages fail to translate must be selected (the availability of these
is determined by an administrator-defined locale setting).
Note: For Red Hat Enterprise Linux 4, this update upgrades PostgreSQL
to version 7.4.26. For Red Hat Enterprise Linux 5, this update
upgrades PostgreSQL to version 8.1.18. Refer to the PostgreSQL Release
Notes for a list of changes :
All PostgreSQL users should upgrade to these updated packages, which
resolve these issues. If the postgresql service is running, it will be
automatically restarted after installing this update.
See also :
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 6.5
CVSS Temporal Score : 4.8
Public Exploit Available : false
Family: Red Hat Local Security Checks
Nessus Plugin ID: 42064 ()
Bugtraq ID: 3409036314
CVE ID: CVE-2007-6600CVE-2009-0922CVE-2009-3230
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.