openSUSE Security Update : postgresql92 (openSUSE-SU-2013:0628-1)

This script is Copyright (C) 2014-2015 Tenable Network Security, Inc.

Synopsis :

The remote openSUSE host is missing a security update.

Description :

postgresql was updated to version 9.2.4 (bnc#812525) :

- CVE-2013-1899: Fix insecure parsing of server
command-line switches. A connection request containing a
database name that begins with '-' could be crafted to
damage or destroy files within the server's data
directory, even if the request is eventually rejected.

- CVE-2013-1900: Reset OpenSSL randomness state in each
postmaster child process. This avoids a scenario wherein
random numbers generated by 'contrib/pgcrypto' functions
might be relatively easy for another database user to
guess. The risk is only significant when the postmaster
is configured with ssl = on but most connections don't
use SSL encryption.

- CVE-2013-1901: Make REPLICATION privilege checks test
current user not authenticated user. An unprivileged
database user could exploit this mistake to call
pg_start_backup() or pg_stop_backup(), thus possibly
interfering with creation of routine backups.

- See the release notes for the rest of the changes:
html /usr/share/doc/packages/postgresql92/HISTORY

See also :

Solution :

Update the affected postgresql92 packages.

Risk factor :

High / CVSS Base Score : 8.5

Family: SuSE Local Security Checks

Nessus Plugin ID: 74962 ()

Bugtraq ID:

CVE ID: CVE-2013-1899

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now