CVE-2012-2143

MEDIUM
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The crypt_des (aka DES-based crypt) function in FreeBSD before 9.0-RELEASE-p2, as used in PHP, PostgreSQL, and other products, does not process the complete cleartext password if this password contains a 0x80 character, which makes it easier for context-dependent attackers to obtain access via an authentication attempt with an initial substring of the intended password, as demonstrated by a Unicode password.

References

http://git.php.net/?p=php-src.git;a=commit;h=aab49e934de1fff046e659cbec46e3d053b41c34

http://git.postgresql.org/gitweb/?p=postgresql.git&a=commit&h=932ded2ed51e8333852e370c7a6dad75d9f236f9

http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705

http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html

http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082258.html

http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082292.html

http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082294.html

http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00003.html

http://lists.opensuse.org/opensuse-updates/2012-09/msg00102.html

http://lists.opensuse.org/opensuse-updates/2012-10/msg00013.html

http://lists.opensuse.org/opensuse-updates/2012-10/msg00024.html

http://rhn.redhat.com/errata/RHSA-2012-1037.html

http://secunia.com/advisories/49304

http://secunia.com/advisories/50718

http://security.freebsd.org/advisories/FreeBSD-SA-12:02.crypt.asc

http://support.apple.com/kb/HT5501

http://www.debian.org/security/2012/dsa-2491

http://www.mandriva.com/security/advisories?name=MDVSA-2012:092

http://www.postgresql.org/docs/8.3/static/release-8-3-19.html

http://www.postgresql.org/docs/8.4/static/release-8-4-12.html

http://www.postgresql.org/docs/9.0/static/release-9-0-8.html

http://www.postgresql.org/docs/9.1/static/release-9-1-4.html

http://www.postgresql.org/support/security/

http://www.securitytracker.com/id?1026995

https://bugzilla.redhat.com/show_bug.cgi?id=816956

Details

Source: MITRE

Published: 2012-07-05

Updated: 2016-12-08

Type: CWE-310

Risk Information

CVSS v2

Base Score: 4.3

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Impact Score: 2.9

Exploitability Score: 8.6

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:postgresql:postgresql:8.3:*:*:*:*:*:*:*

cpe:2.3:a:postgresql:postgresql:8.4:*:*:*:*:*:*:*

cpe:2.3:a:postgresql:postgresql:9.0:*:*:*:*:*:*:*

cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:o:freebsd:freebsd:1.0:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:1.1:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:1.1.5:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:1.1.5.1:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:2.1:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:2.1.5:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:2.1.6:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:2.1.7:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:2.2:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:2.2.1:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:2.2.2:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:2.2.5:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:2.2.6:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:2.2.7:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:2.2.8:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:3.0:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:3.1:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:3.2:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:3.3:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:3.4:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:3.5:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:4.3:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:4.5:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:4.6.2:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:4.10:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:4.11:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:5.2.1:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:5.4:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:5.5:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:6.0:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:6.1:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:6.2:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:6.3:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:6.4:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:7.0:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:7.1:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:7.2:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:7.3:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:7.4:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:8.0:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:8.1:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:8.2:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:8.3:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:* versions up to 9.0 (inclusive)

Configuration 3

OR

cpe:2.3:a:php:php:1.0:*:*:*:*:*:*:*

cpe:2.3:a:php:php:2.0:*:*:*:*:*:*:*

cpe:2.3:a:php:php:2.0b10:*:*:*:*:*:*:*

cpe:2.3:a:php:php:3.0:*:*:*:*:*:*:*

cpe:2.3:a:php:php:3.0.1:*:*:*:*:*:*:*

cpe:2.3:a:php:php:3.0.2:*:*:*:*:*:*:*

cpe:2.3:a:php:php:3.0.3:*:*:*:*:*:*:*

cpe:2.3:a:php:php:3.0.4:*:*:*:*:*:*:*

cpe:2.3:a:php:php:3.0.5:*:*:*:*:*:*:*

cpe:2.3:a:php:php:3.0.6:*:*:*:*:*:*:*

cpe:2.3:a:php:php:3.0.7:*:*:*:*:*:*:*

cpe:2.3:a:php:php:3.0.8:*:*:*:*:*:*:*

cpe:2.3:a:php:php:3.0.9:*:*:*:*:*:*:*

cpe:2.3:a:php:php:3.0.10:*:*:*:*:*:*:*

cpe:2.3:a:php:php:3.0.11:*:*:*:*:*:*:*

cpe:2.3:a:php:php:3.0.12:*:*:*:*:*:*:*

cpe:2.3:a:php:php:3.0.13:*:*:*:*:*:*:*

cpe:2.3:a:php:php:3.0.14:*:*:*:*:*:*:*

cpe:2.3:a:php:php:3.0.15:*:*:*:*:*:*:*

cpe:2.3:a:php:php:3.0.16:*:*:*:*:*:*:*

cpe:2.3:a:php:php:3.0.17:*:*:*:*:*:*:*

cpe:2.3:a:php:php:3.0.18:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.0:beta1:*:*:*:*:*:*

cpe:2.3:a:php:php:4.0:beta2:*:*:*:*:*:*

cpe:2.3:a:php:php:4.0:beta3:*:*:*:*:*:*

cpe:2.3:a:php:php:4.0:beta4:*:*:*:*:*:*

cpe:2.3:a:php:php:4.0:beta_4_patch1:*:*:*:*:*:*

cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.4.7:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.4.8:*:*:*:*:*:*:*

cpe:2.3:a:php:php:4.4.9:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*

cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*

cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*

cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*

cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*

cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*

cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*

cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.2.7:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.2.8:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.2.9:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.2.10:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.2.11:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.2.12:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.2.13:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.2.14:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.2.15:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.2.16:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.2.17:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.3.1:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.3.2:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.3.3:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.3.4:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.3.5:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.3.6:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.3.7:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.3.8:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.3.9:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.3.10:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.3.11:*:*:*:*:*:*:*

cpe:2.3:a:php:php:5.3.12:*:*:*:*:*:*:*

cpe:2.3:a:php:php:*:*:*:*:*:*:*:* versions up to 5.3.13 (inclusive)

Tenable Plugins

View all (50 total)

IDNameProductFamilySeverity
9097PHP 5.3.x < 5.3.14 / 5.4.x < 5.4.4 Multiple VulnerabilitiesNessus Network MonitorWeb Servers
high
74773openSUSE Security Update : postgresql (openSUSE-SU-2012:1299-1)NessusSuSE Local Security Checks
medium
74769openSUSE Security Update : postgresql / postgresql-libs (openSUSE-SU-2012:1288-1)NessusSuSE Local Security Checks
medium
74766openSUSE Security Update : postgresql / postgresql-libs (openSUSE-SU-2012:1251-1)NessusSuSE Local Security Checks
medium
74667openSUSE Security Update : php5 (openSUSE-SU-2012:0826-1)NessusSuSE Local Security Checks
medium
69702Amazon Linux AMI : php (ALAS-2012-95)NessusAmazon Linux Local Security Checks
high
69701Amazon Linux AMI : postgresql8 (ALAS-2012-94)NessusAmazon Linux Local Security Checks
medium
69698Amazon Linux AMI : postgresql9 (ALAS-2012-91)NessusAmazon Linux Local Security Checks
medium
68571Oracle Linux 5 : php53 (ELSA-2012-1047)NessusOracle Linux Local Security Checks
high
68570Oracle Linux 6 : php (ELSA-2012-1046)NessusOracle Linux Local Security Checks
high
68568Oracle Linux 5 / 6 : postgresql / postgresql84 (ELSA-2012-1037)NessusOracle Linux Local Security Checks
medium
68567Oracle Linux 5 : postgresql (ELSA-2012-1036)NessusOracle Linux Local Security Checks
medium
67089CentOS 5 : php53 (CESA-2012:1047)NessusCentOS Local Security Checks
high
6816PostgreSQL < 8.3.19 / 8.4.12 / 9.0.8 / 9.1.4 Multiple VulnerabilitiesNessus Network MonitorDatabase
medium
64216SuSE 11.1 Security Update : PostgreSQL (SAT Patch Number 6697)NessusSuSE Local Security Checks
medium
64104SuSE 11.2 Security Update : PHP5 (SAT Patch Number 6440)NessusSuSE Local Security Checks
high
63353PostgreSQL 8.3 < 8.3.19 / 8.4 < 8.4.12 / 9.0 < 9.0.8 / 9.1 < 9.1.4 Multiple VulnerabilitiesNessusDatabases
high
62380GLSA-201209-24 : PostgreSQL: Multiple vulnerabilitiesNessusGentoo Local Security Checks
medium
62236GLSA-201209-03 : PHP: Multiple vulnerabilitiesNessusGentoo Local Security Checks
critical
6584Mac OS X 10.8 < 10.8.2 Multiple VulnerabilitiesNessus Network MonitorGeneric
critical
6583Mac OS X 10.7 < 10.7.5 Multiple VulnerabilitiesNessus Network MonitorGeneric
critical
62215Mac OS X 10.8.x < 10.8.2 Multiple VulnerabilitiesNessusMacOS X Local Security Checks
critical
62214Mac OS X 10.7.x < 10.7.5 Multiple Vulnerabilities (BEAST)NessusMacOS X Local Security Checks
critical
62213Mac OS X Multiple Vulnerabilities (Security Update 2012-004) (BEAST)NessusMacOS X Local Security Checks
critical
61358Scientific Linux Security Update : php on SL6.x i386/x86_64 (20120627)NessusScientific Linux Local Security Checks
high
61356Scientific Linux Security Update : php53 on SL5.x i386/x86_64 (20120627)NessusScientific Linux Local Security Checks
high
61354Scientific Linux Security Update : postgresql on SL5.x i386/x86_64 (20120625)NessusScientific Linux Local Security Checks
medium
61353Scientific Linux Security Update : postgresql and postgresql84 on SL6.x i386/x86_64 (20120625)NessusScientific Linux Local Security Checks
medium
61352Scientific Linux Security Update : postgresql and postgresql84 on SL5.x i386/x86_64 (20120625)NessusScientific Linux Local Security Checks
medium
59938CentOS 6 : php (CESA-2012:1046)NessusCentOS Local Security Checks
high
59827Fedora 16 : maniadrive-1.2-32.fc16.6 / php-5.3.14-1.fc16 / php-eaccelerator-0.9.6.1-9.fc16.6 (2012-9762)NessusFedora Local Security Checks
high
59801Fedora 17 : maniadrive-1.2-41.fc17 / php-5.4.4-1.fc17 (2012-9490)NessusFedora Local Security Checks
high
59769Debian DSA-2491-1 : postgresql-8.4 - several vulnerabilitiesNessusDebian Local Security Checks
medium
59753RHEL 5 : php53 (RHSA-2012:1047)NessusRed Hat Local Security Checks
high
59752RHEL 6 : php (RHSA-2012:1046)NessusRed Hat Local Security Checks
high
59746FreeBSD : FreeBSD -- Incorrect crypt() hashing (185ff22e-c066-11e1-b5e0-000c299b62e1)NessusFreeBSD Local Security Checks
medium
59719CentOS 5 / 6 : postgresql / postgresql84 (CESA-2012:1037)NessusCentOS Local Security Checks
medium
59712RHEL 5 / 6 : postgresql and postgresql84 (RHSA-2012:1037)NessusRed Hat Local Security Checks
medium
59711RHEL 5 : postgresql (RHSA-2012:1036)NessusRed Hat Local Security Checks
medium
59687CentOS 5 : postgresql (CESA-2012:1036)NessusCentOS Local Security Checks
medium
59603Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : php5 vulnerabilities (USN-1481-1)NessusUbuntu Local Security Checks
high
59539Fedora 17 : postgresql-9.1.4-1.fc17 (2012-8924)NessusFedora Local Security Checks
medium
59538Fedora 15 : postgresql-9.0.8-1.fc15 (2012-8915)NessusFedora Local Security Checks
medium
59534Fedora 16 : postgresql-9.1.4-1.fc16 (2012-8893)NessusFedora Local Security Checks
medium
59530PHP 5.4.x < 5.4.4 Multiple VulnerabilitiesNessusCGI abuses
high
59529PHP 5.3.x < 5.3.14 Multiple VulnerabilitiesNessusCGI abuses
high
59519Mandriva Linux Security Advisory : php (MDVSA-2012:093)NessusMandriva Local Security Checks
high
59518Mandriva Linux Security Advisory : postgresql (MDVSA-2012:092)NessusMandriva Local Security Checks
medium
59385Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : postgresql-8.3, postgresql-8.4, postgresql-9.1 vulnerabilities (USN-1461-1)NessusUbuntu Local Security Checks
medium
59314FreeBSD : databases/postgresql*-server -- crypt vulnerabilities (a8864f8f-aa9e-11e1-a284-0023ae8e59f0)NessusFreeBSD Local Security Checks
medium