Amazon Linux AMI : postgresql8 Multiple Vulnerabilities (ALAS-2012-129)

This script is Copyright (C) 2013 Tenable Network Security, Inc.


Synopsis :

The remote Amazon Linux AMI host is missing a security update.

Description :

It was found that the 'xml' data type allowed local files and remote
URLs to be read with the privileges of the database server to resolve
DTD and entity references in the provided XML. An unprivileged
database user could use this flaw to read local files they would
otherwise not have access to by issuing a specially-crafted SQL query.
Note that the full contents of the files were not returned, but
portions could be displayed to the user via error messages.
(CVE-2012-3489)

It was found that the optional PostgreSQL xml2 contrib module allowed
local files and remote URLs to be read and written to with the
privileges of the database server when parsing Extensible Stylesheet
Language Transformations (XSLT). An unprivileged database user could
use this flaw to read and write to local files (such as the database's
configuration files) and remote URLs they would otherwise not have
access to by issuing a specially-crafted SQL query. (CVE-2012-3488)

See also :

http://www.nessus.org/u?00a697b5

Solution :

Run 'yum update postgresql8' to update your system.

Risk factor :

Medium / CVSS Base Score : 4.9
(CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:N)

Family: Amazon Linux Local Security Checks

Nessus Plugin ID: 69619 ()

Bugtraq ID:

CVE ID: CVE-2012-3488
CVE-2012-3489