Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Detailed Explanation for this Vulnerability Assessment
Several encoding problems have been discovered in PostgreSQL, a
popular SQL database. The Common Vulnerabilities and Exposures
project identifies the following problems:
Akio Ishida and Yasuo Ohgaki discovered a weakness in the handling
of invalidly-encoded multibyte text data which could permit an
attacker to inject arbitrary SQL commands.
A similar problem exists in client-side encodings (such as SJIS,
BIG5, GBK, GB18030, and UHC) which contain valid multibyte
characters that end with the backslash character. A possible hacker
could supply a specially crafted byte sequence that is able to
inject arbitrary SQL commands.
This issue does not affect you if you only use single-byte (like
SQL_ASCII or the ISO-8859-X family) or unaffected multibyte (like
psycopg and python-pgsql use the old encoding for binary data and
may have to be updated.
The old stable distribution (woody) is affected by these problems but
we're unable to correct the package.
For the stable distribution (sarge) these problems have been fixed in
For the unstable distribution (sid) these problems have been fixed in
We recommend that you upgrade your postgresql packages.
Solution : http://www.debian.org/security/2006/dsa-1087
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi
|Apple iMac ME087LL/A 21.5 256GB SSD 16GB RAM Intel Core i7 3.1GHz
No Discussions have been posted on this vulnerability.