CentOS 3 / 4 : postgresql (CESA-2006:0526)

High Nessus Plugin ID 21905

Synopsis

The remote CentOS host is missing one or more security updates.

Description

Updated postgresql packages that fix several security vulnerabilities are now available for Red Hat Enterprise Linux 3 and 4.

This update has been rated as having important security impact by the Red Hat Security Response Team.

PostgreSQL is an advanced Object-Relational database management system (DBMS).

A bug was found in the way PostgreSQL's PQescapeString function escapes strings when operating in a multibyte character encoding. It is possible for an attacker to provide an application a carefully crafted string containing invalidly-encoded characters, which may be improperly escaped, allowing the attacker to inject malicious SQL.
While this update fixes how PQescapeString operates, the PostgreSQL server has also been modified to prevent such an attack occurring through unpatched clients. (CVE-2006-2313, CVE-2006-2314). More details about this issue are available in the linked PostgreSQL technical documentation.

An integer signedness bug was found in the way PostgreSQL generated password salts. The actual salt size is only half the size of the expected salt, making the process of brute forcing password hashes slightly easier. This update will not strengthen already existing passwords, but all newly assigned passwords will have the proper salt length. (CVE-2006-0591)

Users of PostgreSQL should upgrade to these updated packages containing PostgreSQL version 7.4.13, which corrects these issues.

Solution

Update the affected postgresql packages.

See Also

http://www.nessus.org/u?25da7d4d

http://www.nessus.org/u?3bce9c62

http://www.nessus.org/u?a2810143

http://www.nessus.org/u?bd654928

http://www.nessus.org/u?3c19efa7

http://www.nessus.org/u?45b7bf81

Plugin Details

Severity: High

ID: 21905

File Name: centos_RHSA-2006-0526.nasl

Version: 1.15

Type: local

Agent: unix

Published: 2006/07/03

Updated: 2018/11/10

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:centos:centos:postgresql, p-cpe:/a:centos:centos:postgresql-contrib, p-cpe:/a:centos:centos:postgresql-devel, p-cpe:/a:centos:centos:postgresql-docs, p-cpe:/a:centos:centos:postgresql-jdbc, p-cpe:/a:centos:centos:postgresql-libs, p-cpe:/a:centos:centos:postgresql-pl, p-cpe:/a:centos:centos:postgresql-python, p-cpe:/a:centos:centos:postgresql-server, p-cpe:/a:centos:centos:postgresql-tcl, p-cpe:/a:centos:centos:postgresql-test, p-cpe:/a:centos:centos:rh-postgresql, p-cpe:/a:centos:centos:rh-postgresql-contrib, p-cpe:/a:centos:centos:rh-postgresql-devel, p-cpe:/a:centos:centos:rh-postgresql-docs, p-cpe:/a:centos:centos:rh-postgresql-jdbc, p-cpe:/a:centos:centos:rh-postgresql-libs, p-cpe:/a:centos:centos:rh-postgresql-pl, p-cpe:/a:centos:centos:rh-postgresql-python, p-cpe:/a:centos:centos:rh-postgresql-server, p-cpe:/a:centos:centos:rh-postgresql-tcl, p-cpe:/a:centos:centos:rh-postgresql-test, cpe:/o:centos:centos:3, cpe:/o:centos:centos:4

Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2006/05/24

Reference Information

CVE: CVE-2006-0591, CVE-2006-2313, CVE-2006-2314

BID: 18092

RHSA: 2006:0526