FreeBSD : pgbouncer -- failed auth_query lookup leads to connection as auth_user (d76961da-56f6-11e5-934b-002590263bf5)

This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

PgBouncer reports :

New auth_user functionality introduced in 1.6 allows login as
auth_user when client presents unknown username. It's quite likely
auth_user is superuser. Affects only setups that have enabled
auth_user in their config.

See also :

https://pgbouncer.github.io/2015/09/pgbouncer-1-6-1/
https://github.com/pgbouncer/pgbouncer/issues/69
http://www.openwall.com/lists/oss-security/2015/09/04/3
http://www.nessus.org/u?4b2c2206

Solution :

Update the affected package.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 85894 ()

Bugtraq ID:

CVE ID: CVE-2015-6817

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now