Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Check for the version of the postgresql package
Detailed Explanation for this Vulnerability Assessment
The remote host is missing the patch for the advisory FEDORA-2006-578 (postgresql).
PostgreSQL is an advanced Object-Relational database management system
(DBMS) that supports almost all SQL constructs (including
transactions, subselects and user-defined types and functions). The
postgresql package includes the client programs and libraries that
you'll need to access a PostgreSQL DBMS server. These PostgreSQL
client programs are programs that directly manipulate the internal
structure of PostgreSQL databases on a PostgreSQL server. These client
programs can be located on the same machine with the PostgreSQL
server, or may be on a remote machine which accesses a PostgreSQL
server over a network connection. This package contains the docs
in HTML for the whole package, as well as command-line utilities for
managing PostgreSQL databases on a PostgreSQL server.
If you want to manipulate a PostgreSQL database on a remote PostgreSQL
server, you need this package. You also need to install this package
if you're installing the postgresql-server package.
Update information :
* Mon May 22 2006 Tom Lane
- Update to PostgreSQL 8.1.4 (includes fixes for CVE-2006-2313, CVE-2006-2314
see bug #192173)
- Update to PyGreSQL 3.8
- Update to jdbc driver build 406
- Suppress noise from chcon, per bug #187744
Solution : Get the newest Fedora Updates
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: This script is Copyright (C) 2007 Tenable Network Security
|HP J3188A 10Base- T Hub- 16M | Cisco IOS 1516M | 16 Ethernet Ports | 100-240 V
|Cisco 3702i (AIR-CAP3702I-A-K9) LWAPP 802.11 AC Access Point-READ
|Cisco Aironet 1602E IEEE 802.11n 300 Mbps Wireless AP (AIR-CAP1602E-A-K9)
|Genuine Cisco Catalyst 2950 48-Port Switch WS-C2950G-48-EI
No Discussions have been posted on this vulnerability.