|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200505-12] PostgreSQL: Multiple vulnerabilities Vulnerability Assessment Details
|
[GLSA-200505-12] PostgreSQL: Multiple vulnerabilities |
||
PostgreSQL: Multiple vulnerabilities Detailed Explanation for this Vulnerability Assessment The remote host is affected by the vulnerability described in GLSA-200505-12 (PostgreSQL: Multiple vulnerabilities) PostgreSQL gives public EXECUTE access to a number of character conversion routines, but doesn't validate the given arguments (CVE-2005-1409). It has also been reported that the contrib/tsearch2 module of PostgreSQL misdeclares the return value of some functions as "internal" (CVE-2005-1410). Impact A possible hacker could call the character conversion routines with specially setup arguments to crash the backend process of PostgreSQL or to potentially gain administrator rights. A malicious user could also call the misdeclared functions of the contrib/tsearch2 module, resulting in a Denial of Service or other, yet uninvestigated, impacts. Workaround There is no known workaround at this time. References: http://www.postgresql.org/about/news.315 http://cve.mitre.org/cgi-bin/cvename.cgi?name=2005-1409 http://cve.mitre.org/cgi-bin/cvename.cgi?name=2005-1410 http://www.postgresql.org/about/news.315 Solution: All PostgreSQL users should update to the latest available version and follow the guide at http://www.postgresql.o rg/about/news.315 # emerge --sync # emerge --ask --oneshot --verbose dev-db/postgresql Network Security Threat Level: Medium Networks Security ID: Vulnerability Assessment Copyright: (C) 2005 Michel Arboi |
||
Cables, Connectors |
Knoppix 9.1 Live Linux GNU Bootable USB Flash Drive USA
$19.99
$8.50
Knoppix Live GNU Linux System 9.1 on Bootable CD / DVD / USB Flash Drive
$9.99
$12.00
Linux Knoppix 4.0.2 Installation Disc
$39.99
Knoppix Linux Bootable OS v8.6 "Original Live Operating System" 32G USB Stick
$20.30
KNOPPIX 9.1 LINUX INSTALL & LIVE DVD
$9.99
Acer Aspire One 9 inch Netbook ZG5 512MB RAM 8GB SSD HD Knoppix Linux WiFi VGA
$79.99
New Knoppix 9.2 Pro Bootable Live OS x86 64Bit DVD Linux
$9.97
Knoppix Linux Bootable OS v8.6 "Original Live Operating System" 16G USB Stick
$19.95
|
||
No Discussions have been posted on this vulnerability. |