Debian DSA-2418-1 : postgresql-8.4 - several vulnerabilities

medium Nessus Plugin ID 58135


The remote Debian host is missing a security-related update.


Several local vulnerabilities have been discovered in PostgreSQL, an object-relational SQL database. The Common Vulnerabilities and Exposures project identifies the following problems :

- CVE-2012-0866 It was discovered that the permissions of a function called by a trigger are not checked. This could result in privilege escalation.

- CVE-2012-0867 It was discovered that only the first 32 characters of a host name are checked when validating host names through SSL certificates. This could result in spoofing the connection in limited circumstances.

- CVE-2012-0868 It was discovered that pg_dump did not sanitise object names. This could result in arbitrary SQL command execution if a malformed dump file is opened.


Upgrade the postgresql-8.4 packages.

For the stable distribution (squeeze), this problem has been fixed in version 8.4.11-0squeeze1.

See Also

Plugin Details

Severity: Medium

ID: 58135

File Name: debian_DSA-2418.nasl

Version: 1.14

Type: local

Agent: unix

Published: 2/28/2012

Updated: 1/11/2021

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Nessus Agent

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:postgresql-8.4, cpe:/o:debian:debian_linux:6.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 2/27/2012

Reference Information

CVE: CVE-2012-0866, CVE-2012-0867, CVE-2012-0868

BID: 52188

DSA: 2418