Debian DSA-2340-1 : postgresql-8.3, postgresql-8.4, postgresql-9.0 - weak password hashing

Medium Nessus Plugin ID 56730

Synopsis

The remote Debian host is missing a security-related update.

Description

magnum discovered that the blowfish password hashing used amongst others in PostgreSQL contained a weakness that would give passwords with 8 bit characters the same hash as weaker equivalents.

Solution

Upgrade the postgresql packages.

For the oldstable distribution (lenny), this problem has been fixed in postgresql-8.3 version 8.3.16-0lenny1.

For the stable distribution (squeeze), this problem has been fixed in postgresql-8.4 version 8.4.9-0squeeze1.

The updates also include reliability improvements, originally scheduled for inclusion into the next point release; for details see the respective changelogs.

See Also

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=631285

https://packages.debian.org/source/squeeze/postgresql-8.4

https://www.debian.org/security/2011/dsa-2340

Plugin Details

Severity: Medium

ID: 56730

File Name: debian_DSA-2340.nasl

Version: 1.9

Type: local

Agent: unix

Published: 2011/11/08

Updated: 2020/03/12

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:postgresql-8.3, p-cpe:/a:debian:debian_linux:postgresql-8.4, p-cpe:/a:debian:debian_linux:postgresql-9.0, cpe:/o:debian:debian_linux:5.0, cpe:/o:debian:debian_linux:6.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2011/11/07

Reference Information

CVE: CVE-2011-2483

BID: 49241

DSA: 2340