Language:
https://www.postgresql.org/docs/9.1/release.html
https://bugzilla.novell.com/show_bug.cgi?id=765069
https://bugzilla.novell.com/show_bug.cgi?id=766797
https://bugzilla.novell.com/show_bug.cgi?id=776523
https://bugzilla.novell.com/show_bug.cgi?id=776524
https://lists.opensuse.org/opensuse-updates/2012-09/msg00102.html
Severity: Medium
ID: 74766
File Name: openSUSE-2012-650.nasl
Version: 1.7
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 6/13/2014
Updated: 1/19/2021
Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Medium
Score: 6.5
Risk Factor: Medium
Base Score: 4.9
Temporal Score: 3.6
Vector: CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:N
CPE: p-cpe:/a:novell:opensuse:libecpg6, p-cpe:/a:novell:opensuse:postgresql, p-cpe:/a:novell:opensuse:postgresql-libs-debugsource, p-cpe:/a:novell:opensuse:libpq5-debuginfo, p-cpe:/a:novell:opensuse:postgresql-devel-debuginfo, p-cpe:/a:novell:opensuse:postgresql-pltcl, p-cpe:/a:novell:opensuse:postgresql-plperl-debuginfo, cpe:/o:novell:opensuse:12.1, p-cpe:/a:novell:opensuse:libpq5, p-cpe:/a:novell:opensuse:postgresql-plperl, p-cpe:/a:novell:opensuse:postgresql-devel, p-cpe:/a:novell:opensuse:postgresql-server-debuginfo, p-cpe:/a:novell:opensuse:libpq5-debuginfo-32bit, p-cpe:/a:novell:opensuse:postgresql-pltcl-debuginfo, p-cpe:/a:novell:opensuse:postgresql-plpython, p-cpe:/a:novell:opensuse:postgresql-server, p-cpe:/a:novell:opensuse:postgresql-debuginfo, p-cpe:/a:novell:opensuse:postgresql-plpython-debuginfo, p-cpe:/a:novell:opensuse:postgresql-devel-32bit, p-cpe:/a:novell:opensuse:postgresql-contrib-debuginfo, p-cpe:/a:novell:opensuse:postgresql-debugsource, p-cpe:/a:novell:opensuse:postgresql-devel-debuginfo-32bit, p-cpe:/a:novell:opensuse:postgresql-contrib, p-cpe:/a:novell:opensuse:libpq5-32bit, p-cpe:/a:novell:opensuse:libecpg6-debuginfo
Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu
Exploit Ease: No known exploits are available
Patch Publication Date: 9/18/2012
CVE: CVE-2012-2143, CVE-2012-2655, CVE-2012-3488, CVE-2012-3489