Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> SuSE Local Security Checks >> SUSE-SA:2005:027: postgresql


Vulnerability Assessment Details

SUSE-SA:2005:027: postgresql

Vulnerability Assessment Summary
Check for the version of the postgresql package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory SUSE-SA:2005:027 (postgresql).


Several problems were identified and fixed in the PostgreSQL
database server.

Multiple buffer overflows in the low level parsing routines may
permit attackers to execute arbitrary code via:

(1) a large number of variables in a SQL statement being handled by
the read_sql_construct() function,

(2) a large number of INTO variables in a SELECT statement being
handled by the make_select_stmt function,

(3) a large number of arbitrary variables in a SELECT statement being
handled by the make_select_stmt function, and

(4) a large number of INTO variables in a FETCH statement being
handled by the make_fetch_stmt function.


This is tracked by the Mitre CVE ID CVE-2005-0247.


Solution : http://www.suse.de/security/advisories/2005_27_postgresql.html
Network Security Threat Level: Medium

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors


Dell Precision T3500 Xeon Workstation Computer Windows 10 Home 8GB 250GB 500GB picture

Dell Precision T3500 Xeon Workstation Computer Windows 10 Home 8GB 250GB 500GB

$150.99



CM8066002031501 INTEL XEON E5-2680V4 2.40GHZ 35MB 14-CORE 120W PROCESSOR picture

CM8066002031501 INTEL XEON E5-2680V4 2.40GHZ 35MB 14-CORE 120W PROCESSOR

$23.95



Intel Xeon CPU E5-2667 V2 3.30GHz 25MB Cache 8 Core LGA2011 Processor SR19W picture

Intel Xeon CPU E5-2667 V2 3.30GHz 25MB Cache 8 Core LGA2011 Processor SR19W

$14.99



Intel Xeon E5-2699 v3 2.3 GHz 45 MB 18 Core SR1XD LGA2011-3 Clean Pull CPU picture

Intel Xeon E5-2699 v3 2.3 GHz 45 MB 18 Core SR1XD LGA2011-3 Clean Pull CPU

$63.95



Intel Xeon E3-1275v2 3.5 GHz SR0PA LGA1155 4 Cores 8 Threads CPU Processor picture

Intel Xeon E3-1275v2 3.5 GHz SR0PA LGA1155 4 Cores 8 Threads CPU Processor

$29.99



SR3B5 INTEL XEON GOLD 6138 2.00GHZ 27.5MB 20-CORE 125W PROCESSOR  picture

SR3B5 INTEL XEON GOLD 6138 2.00GHZ 27.5MB 20-CORE 125W PROCESSOR

$105.00



Intel Xeon CPU E5-2690 2.90GHz 20MB Cache 8 Core Socket LGA2011 Processor SR0L0 picture

Intel Xeon CPU E5-2690 2.90GHz 20MB Cache 8 Core Socket LGA2011 Processor SR0L0

$7.99



Matching Pair Intel Xeon E5-2680 v2 10-Core 2.80GHz 25MB LGA2011 Processor SR1A6 picture

Matching Pair Intel Xeon E5-2680 v2 10-Core 2.80GHz 25MB LGA2011 Processor SR1A6

$24.99



Lenovo ThinkStation P500 Xeon E5-1630 v3 64GB RAM 500GB SSD+1TB HDD Quadro K2000 picture

Lenovo ThinkStation P500 Xeon E5-1630 v3 64GB RAM 500GB SSD+1TB HDD Quadro K2000

$399.99



Intel Xeon E5-2698 v3 SR21T picture

Intel Xeon E5-2698 v3 SR21T

$33.00



Discussions

No Discussions have been posted on this vulnerability.