Various vulnerabilities have been reported in PostgreSQL. Some have an unknown impact and others can can be exploited by malicious users to cause a DoS (Denial of Service), bypass certain security restrictions, or gain escalated privileges.
1) An error in the "LOAD" option can be exploited by malicious, unprivileged database users to load arbitrary libraries.
Successful exploitation may allow execution of arbitrary code with escalated privileges, but requires that the platform automatically executes initialization functions of shared libraries (includes Windows and ELF-based Unix / Linux systems).
2) A missing permissions check makes it possible for a creator of an aggregate function to execute the specified transition functions. This bypasses the denial of "EXECUTE" permissions on a function.
3) An unspecified security issue in "contrib/intagg" can be exploited to cause a DoS via specially crafted arrays.
4) Multiple boundary errors in the PL/PgSQL parser may be exploited to cause buffer overflows.
NOTE: Other issues have also been reported, which may be security related.
Solution: Update to version 8.0.1, 7.4.7, 7.3.9, or 7.2.7 to fix all vulnerabilities but CAN-2005-0247.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to email@example.com
Subject: PostgreSQL Multiple Vulnerabilities
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.