openSUSE Security Update : postgresql91 (openSUSE-SU-2013:0627-1)

This script is Copyright (C) 2014-2015 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

postgresql was updated to version 9.1.9 (bnc#812525) :

- CVE-2013-1899: Fix insecure parsing of server
command-line switches. A connection request containing a
database name that begins with '-' could be crafted to
damage or destroy files within the server's data
directory, even if the request is eventually rejected.

- CVE-2013-1900: Reset OpenSSL randomness state in each
postmaster child process. This avoids a scenario wherein
random numbers generated by 'contrib/pgcrypto' functions
might be relatively easy for another database user to
guess. The risk is only significant when the postmaster
is configured with ssl = on but most connections don't
use SSL encryption.

- CVE-2013-1901: Make REPLICATION privilege checks test
current user not authenticated user. An unprivileged
database user could exploit this mistake to call
pg_start_backup() or pg_stop_backup(), thus possibly
interfering with creation of routine backups.

- See the release notes for the rest of the changes:
http://www.postgresql.org/docs/9.1/static/release-9-1-9.
html /usr/share/doc/packages/postgresql91/HISTORY

See also :

http://lists.opensuse.org/opensuse-updates/2013-04/msg00044.html
http://www.postgresql.org/docs/9.1/static/release-9-1-9.html
https://bugzilla.novell.com/show_bug.cgi?id=812525

Solution :

Update the affected postgresql91 packages.

Risk factor :

High / CVSS Base Score : 8.5
(CVSS2#AV:N/AC:M/Au:S/C:C/I:C/A:C)

Family: SuSE Local Security Checks

Nessus Plugin ID: 74963 ()

Bugtraq ID:

CVE ID: CVE-2013-1899
CVE-2013-1900
CVE-2013-1901

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now