PostgreSQL LDAP Anonymous Bind Authentication Bypass

medium Nessus Plugin ID 40947
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The database service running on the remote host has an authentication bypass vulnerability.


The version of PostgreSQL running on the remote host has an authentication bypass vulnerability. If PostgreSQL is using LDAP authentication, and the LDAP server is configured to allow anonymous binds, it may be possible to log into the PostgreSQL server using a blank password. A remote attacker could exploit this to gain access to the database server, possibly as an administrator.

There are reportedly other vulnerabilities in this version of PostgreSQL, though Nessus has not checked for those issues.


Upgrade to PostgreSQL 8.2.14 / 8.3.8 or later.

See Also

Plugin Details

Severity: Medium

ID: 40947

File Name: postgresql_ldap_auth_bypass.nasl

Version: 1.12

Type: remote

Family: Databases

Published: 9/11/2009

Updated: 11/15/2018

Dependencies: postgresql_detect.nasl

Risk Information


Risk Factor: Medium

Score: 5.3


Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*

Exploit Ease: No known exploits are available

Patch Publication Date: 9/9/2009

Vulnerability Publication Date: 9/9/2009

Reference Information

CVE: CVE-2009-3231

BID: 36314

CWE: 287

Secunia: 36660