This script is Copyright (C) 2014-2015 Tenable Network Security, Inc.
The remote openSUSE host is missing a security update.
postgresql was updated to version 9.1.9 (bnc#812525) :
- CVE-2013-1899: Fix insecure parsing of server
command-line switches. A connection request containing a
database name that begins with '-' could be crafted to
damage or destroy files within the server's data
directory, even if the request is eventually rejected.
- CVE-2013-1900: Reset OpenSSL randomness state in each
postmaster child process. This avoids a scenario wherein
random numbers generated by 'contrib/pgcrypto' functions
might be relatively easy for another database user to
guess. The risk is only significant when the postmaster
is configured with ssl = on but most connections don't
use SSL encryption.
- CVE-2013-1901: Make REPLICATION privilege checks test
current user not authenticated user. An unprivileged
database user could exploit this mistake to call
pg_start_backup() or pg_stop_backup(), thus possibly
interfering with creation of routine backups.
- See the release notes for the rest of the changes:
See also :
Update the affected postgresql91 packages.
Risk factor :
High / CVSS Base Score : 8.5