Mandriva Linux Security Advisory : postgresql (MDVSA-2009:333)

medium Nessus Plugin ID 43167

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

Multiple vulnerabilities was discovered and corrected in postgresql :

NULL Bytes in SSL Certificates can be used to falsify client or server authentication. This only affects users who have SSL enabled, perform certificate name validation or client certificate authentication, and where the Certificate Authority (CA) has been tricked into issuing invalid certificates. The use of a CA that can be trusted to always issue valid certificates is recommended to ensure you are not vulnerable to this issue (CVE-2009-4034).

Privilege escalation via changing session state in an index function.
This closes a corner case related to vulnerabilities CVE-2009-3230 and CVE-2007-6600 (CVE-2009-4136).

Integer overflow in src/backend/executor/nodeHash.c in PostgreSQL 8.4.1 and earlier, and 8.5 through 8.5alpha2, allows remote authenticated users to cause a denial of service (daemon crash) via a SELECT statement with many LEFT JOIN clauses, related to certain hashtable size calculations (CVE-2010-0733).

Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers

This update provides a solution to these vulnerabilities.

Solution

Update the affected packages.

See Also

https://www.postgresql.org/support/security/

Plugin Details

Severity: Medium

ID: 43167

File Name: mandriva_MDVSA-2009-333.nasl

Version: 1.15

Type: local

Published: 12/16/2009

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.4

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/o:mandriva:linux:2008.0, cpe:/o:mandriva:linux:2009.0, cpe:/o:mandriva:linux:2009.1, cpe:/o:mandriva:linux:2010.0, p-cpe:/a:mandriva:linux:lib64ecpg-devel, p-cpe:/a:mandriva:linux:lib64ecpg5, p-cpe:/a:mandriva:linux:lib64ecpg8.3_6, p-cpe:/a:mandriva:linux:lib64ecpg8.4_6, p-cpe:/a:mandriva:linux:lib64pq-devel, p-cpe:/a:mandriva:linux:lib64pq5, p-cpe:/a:mandriva:linux:lib64pq8.3_5, p-cpe:/a:mandriva:linux:lib64pq8.4_5, p-cpe:/a:mandriva:linux:libecpg-devel, p-cpe:/a:mandriva:linux:libecpg5, p-cpe:/a:mandriva:linux:libecpg8.3_6, p-cpe:/a:mandriva:linux:libecpg8.4_6, p-cpe:/a:mandriva:linux:libpq-devel, p-cpe:/a:mandriva:linux:libpq5, p-cpe:/a:mandriva:linux:libpq8.3_5, p-cpe:/a:mandriva:linux:libpq8.4_5, p-cpe:/a:mandriva:linux:postgresql, p-cpe:/a:mandriva:linux:postgresql-devel, p-cpe:/a:mandriva:linux:postgresql8.2, p-cpe:/a:mandriva:linux:postgresql8.2-contrib, p-cpe:/a:mandriva:linux:postgresql8.2-devel, p-cpe:/a:mandriva:linux:postgresql8.2-docs, p-cpe:/a:mandriva:linux:postgresql8.2-pl, p-cpe:/a:mandriva:linux:postgresql8.2-plperl, p-cpe:/a:mandriva:linux:postgresql8.2-plpgsql, p-cpe:/a:mandriva:linux:postgresql8.2-plpython, p-cpe:/a:mandriva:linux:postgresql8.2-pltcl, p-cpe:/a:mandriva:linux:postgresql8.2-server, p-cpe:/a:mandriva:linux:postgresql8.2-test, p-cpe:/a:mandriva:linux:postgresql8.3, p-cpe:/a:mandriva:linux:postgresql8.3-contrib, p-cpe:/a:mandriva:linux:postgresql8.3-devel, p-cpe:/a:mandriva:linux:postgresql8.3-docs, p-cpe:/a:mandriva:linux:postgresql8.3-pl, p-cpe:/a:mandriva:linux:postgresql8.3-plperl, p-cpe:/a:mandriva:linux:postgresql8.3-plpgsql, p-cpe:/a:mandriva:linux:postgresql8.3-plpython, p-cpe:/a:mandriva:linux:postgresql8.3-pltcl, p-cpe:/a:mandriva:linux:postgresql8.3-server, p-cpe:/a:mandriva:linux:postgresql8.4, p-cpe:/a:mandriva:linux:postgresql8.4-contrib, p-cpe:/a:mandriva:linux:postgresql8.4-devel, p-cpe:/a:mandriva:linux:postgresql8.4-docs, p-cpe:/a:mandriva:linux:postgresql8.4-pl, p-cpe:/a:mandriva:linux:postgresql8.4-plperl, p-cpe:/a:mandriva:linux:postgresql8.4-plpgsql, p-cpe:/a:mandriva:linux:postgresql8.4-plpython, p-cpe:/a:mandriva:linux:postgresql8.4-pltcl, p-cpe:/a:mandriva:linux:postgresql8.4-server

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/15/2009

Reference Information

CVE: CVE-2009-4034, CVE-2009-4136, CVE-2010-0733

BID: 37333, 37334

CWE: 310

MDVSA: 2009:333