RHEL 2.1 : postgresql (RHSA-2003:314)

This script is Copyright (C) 2004-2016 Tenable Network Security, Inc.

Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated PostgreSQL packages that correct a buffer overflow in the
to_ascii routines are now available.

PostgreSQL is an advanced Object-Relational database management system

Two bugs that can lead to buffer overflows have been found in the
PostgreSQL abstract data type to ASCII conversion routines. A remote
attacker who is able to influence the data passed to the to_ascii
functions may be able to execute arbitrary code in the context of the
PostgreSQL server. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CVE-2003-0901 to these issues.

In addition, a bug that can lead to leaks has been found in the string
to timestamp abstract data type conversion routine. If the input
string to the to_timestamp() routine is shorter than what the template
string is expecting, the routine will run off the end of the input
string, resulting in a leak and unstable behaviour.

Users of PostgreSQL are advised to upgrade to these erratum packages,
which contain a backported patch that corrects these issues.

See also :


Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.2
Public Exploit Available : true

Family: Red Hat Local Security Checks

Nessus Plugin ID: 12430 ()

Bugtraq ID: 8741

CVE ID: CVE-2003-0901

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now