Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2006-0526: rh-postgres


Vulnerability Assessment Details

RHSA-2006-0526: rh-postgres

Vulnerability Assessment Summary
Check for the version of the rh packages

Detailed Explanation for this Vulnerability Assessment


Updated postgresql packages that fix several security vulnerabilities are
now available for Red Hat Enterprise Linux 3 and 4.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

PostgreSQL is an advanced Object-Relational database management system
(DBMS).

A bug was found in the way PostgreSQL's PQescapeString function escapes
strings when operating in a multibyte character encoding. It is possible
for a possible hacker to provide an application a carefully crafted string
containing invalidly-encoded characters, which may be improperly escaped,
permiting the attacker to inject malicious SQL. While this update fixes how
PQescapeString operates, the PostgreSQL server has also been modified to
prevent such an attack occurring through unpatched clients.
(CVE-2006-2313, CVE-2006-2314). More details about this issue are
available in the linked PostgreSQL technical documentation.

An integer signedness bug was found in the way PostgreSQL generated
password salts. The actual salt size is only half the size of the expected
salt, making the process of brute forcing password hashes slightly easier.
This update will not strengthen already existing passwords, but all newly
assigned passwords will have the proper salt length. (CVE-2006-0591)

Users of PostgreSQL should upgrade to these updated packages containing
PostgreSQL version 7.4.13, which corrects these issues.




Solution : http://rhn.redhat.com/errata/RHSA-2006-0526.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

Intel PowerEdge 2900 2950 R300 T300 Server Processor SLBBF Xeon Xeon X5470 12MB
$48.79
Intel PowerEdge 2900 2950 R300 T300 Server Processor SLBBF Xeon Xeon X5470 12MB pictureIntel Server Processor SLASE Xeon X3323 2.5GHz 1333MHZ 6MB Tested Ships Today
$17.73
Intel  Server Processor SLASE Xeon X3323 2.5GHz 1333MHZ 6MB Tested Ships Today pictureDell PowerEDGE T630 2x Xeon E5-2630 v3 2.4GHz 64GB 4x 2TB 4X 300GB
$3999.99
Dell PowerEDGE T630 2x Xeon E5-2630 v3 2.4GHz 64GB 4x 2TB 4X 300GB pictureDell PowerEdge R710 2x X5660 2.8GHz 6 Core 32GB 8x 300GB 10K SAS PERC 6/i
$794.0
Dell PowerEdge R710 2x X5660 2.8GHz 6 Core 32GB 8x 300GB 10K SAS PERC 6/i picture


Discussions

No Discussions have been posted on this vulnerability.