RHEL 3 / 4 : postgresql (RHSA-2006:0526)

This script is Copyright (C) 2006-2016 Tenable Network Security, Inc.

Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated postgresql packages that fix several security vulnerabilities
are now available for Red Hat Enterprise Linux 3 and 4.

This update has been rated as having important security impact by the
Red Hat Security Response Team.

PostgreSQL is an advanced Object-Relational database management system

A bug was found in the way PostgreSQL's PQescapeString function
escapes strings when operating in a multibyte character encoding. It
is possible for an attacker to provide an application a carefully
crafted string containing invalidly-encoded characters, which may be
improperly escaped, allowing the attacker to inject malicious SQL.
While this update fixes how PQescapeString operates, the PostgreSQL
server has also been modified to prevent such an attack occurring
through unpatched clients. (CVE-2006-2313, CVE-2006-2314). More
details about this issue are available in the linked PostgreSQL
technical documentation.

An integer signedness bug was found in the way PostgreSQL generated
password salts. The actual salt size is only half the size of the
expected salt, making the process of brute forcing password hashes
slightly easier. This update will not strengthen already existing
passwords, but all newly assigned passwords will have the proper salt
length. (CVE-2006-0591)

Users of PostgreSQL should upgrade to these updated packages
containing PostgreSQL version 7.4.13, which corrects these issues.

See also :


Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.5
Public Exploit Available : true

Family: Red Hat Local Security Checks

Nessus Plugin ID: 21595 ()

Bugtraq ID: 18092

CVE ID: CVE-2006-0591

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now