Synopsis
The remote Debian host is missing one or more security-related updates.
Description
The remote Debian 11 host has packages installed that are affected by multiple vulnerabilities as referenced in the dla-4273 advisory.
- ------------------------------------------------------------------------- Debian LTS Advisory DLA-4273-1 [email protected] https://www.debian.org/lts/security/ Chris Lamb August 14, 2025 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------
Package : postgresql-13 Version : 13.22-0+deb11u1 CVE IDs : CVE-2025-8713 CVE-2025-8714 CVE-2025-8715
It was discovered that there were a number of vulnerabilities in postgresql-13, the widely-popular database management system:
* CVE-2025-8713: The fix for CVE-2017-7484 (plus followup fixes), was intended to prevent leaky functions from being applied to statistics data for columns that the calling user does not have permission to read. Some gaps in that protection were found and addressed.
* CVE-2025-8714: Prevent pg_dump scripts from being used to attack the user running the restore. An attacker who had gained superuser-level control over the source server might have been able to cause it to emit text that would be interpreted as psql meta-commands.
* CVE-2025-8715: Convert newlines to spaces in names included in comments in pg_dump output, because names containing newlines offered the ability to inject arbitrary SQL commands into the output script.
For Debian 11 bullseye, these problems have been fixed in version 13.22-0+deb11u1. Thanks to Christoph Berg (myon) for preparing this upload.
We recommend that you upgrade your postgresql-13 packages.
For the detailed security status of postgresql-13 please refer to its security tracker page at:
https://security-tracker.debian.org/tracker/postgresql-13
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
Tenable has extracted the preceding description block directly from the Debian security advisory.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
Solution
Upgrade the libecpg-compat3 packages.
Plugin Details
File Name: debian_DLA-4273.nasl
Agent: unix
Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Information
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
Vulnerability Information
CPE: p-cpe:/a:debian:debian_linux:libpq-dev, p-cpe:/a:debian:debian_linux:libecpg-dev, cpe:/o:debian:debian_linux:11.0, p-cpe:/a:debian:debian_linux:postgresql-13, p-cpe:/a:debian:debian_linux:postgresql-pltcl-13, p-cpe:/a:debian:debian_linux:libecpg6, p-cpe:/a:debian:debian_linux:postgresql-server-dev-13, p-cpe:/a:debian:debian_linux:libecpg-compat3, p-cpe:/a:debian:debian_linux:postgresql-plperl-13, p-cpe:/a:debian:debian_linux:postgresql-plpython3-13, p-cpe:/a:debian:debian_linux:postgresql-doc-13, p-cpe:/a:debian:debian_linux:libpgtypes3, p-cpe:/a:debian:debian_linux:libpq5, p-cpe:/a:debian:debian_linux:postgresql-client-13
Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
Exploit Ease: No known exploits are available
Patch Publication Date: 8/14/2025
Vulnerability Publication Date: 5/11/2017