CVE-2010-1170

MEDIUM

Description

The PL/Tcl implementation in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2 loads Tcl code from the pltcl_modules table regardless of the table's ownership and permissions, which allows remote authenticated users, with database-creation privileges, to execute arbitrary Tcl code by creating this table and inserting a crafted Tcl script.

References

http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041559.html

http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041579.html

http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041591.html

http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html

http://marc.info/?l=bugtraq&m=134124585221119&w=2

http://osvdb.org/64757

http://secunia.com/advisories/39815

http://secunia.com/advisories/39820

http://secunia.com/advisories/39845

http://secunia.com/advisories/39898

http://secunia.com/advisories/39939

http://www.debian.org/security/2010/dsa-2051

http://www.mandriva.com/security/advisories?name=MDVSA-2010:103

http://www.openwall.com/lists/oss-security/2010/05/20/5

http://www.postgresql.org/about/news.1203

http://www.postgresql.org/docs/current/static/release-7-4-29.html

http://www.postgresql.org/docs/current/static/release-8-0-25.html

http://www.postgresql.org/docs/current/static/release-8-1-21.html

http://www.postgresql.org/docs/current/static/release-8-2-17.html

http://www.postgresql.org/docs/current/static/release-8-3-11.html

http://www.postgresql.org/docs/current/static/release-8-4-4.html

http://www.postgresql.org/support/security

http://www.redhat.com/support/errata/RHSA-2010-0427.html

http://www.redhat.com/support/errata/RHSA-2010-0428.html

http://www.redhat.com/support/errata/RHSA-2010-0429.html

http://www.redhat.com/support/errata/RHSA-2010-0430.html

http://www.securityfocus.com/bid/40215

http://www.securitytracker.com/id?1023987

http://www.vupen.com/english/advisories/2010/1167

http://www.vupen.com/english/advisories/2010/1182

http://www.vupen.com/english/advisories/2010/1197

http://www.vupen.com/english/advisories/2010/1198

http://www.vupen.com/english/advisories/2010/1207

http://www.vupen.com/english/advisories/2010/1221

https://bugzilla.redhat.com/show_bug.cgi?id=583072

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10510

Details

Source: MITRE

Published: 2010-05-19

Updated: 2017-09-19

Type: CWE-264

Risk Information

CVSS v2.0

Base Score: 6

Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 6.8

Severity: MEDIUM