FreeBSD : pgbouncer -- failed auth_query lookup leads to connection as auth_user (d76961da-56f6-11e5-934b-002590263bf5)

high Nessus Plugin ID 85894

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

PgBouncer reports :

New auth_user functionality introduced in 1.6 allows login as auth_user when client presents unknown username. It's quite likely auth_user is superuser. Affects only setups that have enabled auth_user in their config.

Solution

Update the affected package.

See Also

https://pgbouncer.github.io/2015/09/pgbouncer-1-6-1/

https://github.com/pgbouncer/pgbouncer/issues/69

https://www.openwall.com/lists/oss-security/2015/09/04/3

http://www.nessus.org/u?81940f79

Plugin Details

Severity: High

ID: 85894

File Name: freebsd_pkg_d76961da56f611e5934b002590263bf5.nasl

Version: 2.7

Type: local

Published: 9/10/2015

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 8.1

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:pgbouncer, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 9/9/2015

Vulnerability Publication Date: 9/3/2015

Reference Information

CVE: CVE-2015-6817