RHEL 5 / 6 : perl-DBD-Pg (RHSA-2012:1116)

Medium Nessus Plugin ID 60124


The remote Red Hat host is missing one or more security updates.


An updated perl-DBD-Pg package that fixes two security issues is now available for Red Hat Enterprise Linux 5 and 6.

The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.

Perl DBI is a database access Application Programming Interface (API) for the Perl language. perl-DBD-Pg allows Perl applications to access PostgreSQL database servers.

Two format string flaws were found in perl-DBD-Pg. A specially crafted database warning or error message from a server could cause an application using perl-DBD-Pg to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2012-1151)

All users of perl-DBD-Pg are advised to upgrade to this updated package, which contains a backported patch to fix these issues.
Applications using perl-DBD-Pg must be restarted for the update to take effect.


Update the affected perl-DBD-Pg and / or perl-DBD-Pg-debuginfo packages.

See Also



Plugin Details

Severity: Medium

ID: 60124

File Name: redhat-RHSA-2012-1116.nasl

Version: $Revision: 1.13 $

Type: local

Agent: unix

Published: 2012/07/26

Modified: 2017/01/05

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:perl-DBD-Pg, p-cpe:/a:redhat:enterprise_linux:perl-DBD-Pg-debuginfo, cpe:/o:redhat:enterprise_linux:5, cpe:/o:redhat:enterprise_linux:6, cpe:/o:redhat:enterprise_linux:6.3

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2012/07/25

Reference Information

CVE: CVE-2012-1151

BID: 52378

OSVDB: 79977, 79978

RHSA: 2012:1116