Lucene search

K
centosCentOS ProjectCESA-2006:0526
HistoryMay 23, 2006 - 9:38 p.m.

postgresql, rh security update

2006-05-2321:38:04
CentOS Project
lists.centos.org
54

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.012

Percentile

85.2%

CentOS Errata and Security Advisory CESA-2006:0526

PostgreSQL is an advanced Object-Relational database management system
(DBMS).

A bug was found in the way PostgreSQL’s PQescapeString function escapes
strings when operating in a multibyte character encoding. It is possible
for an attacker to provide an application a carefully crafted string
containing invalidly-encoded characters, which may be improperly escaped,
allowing the attacker to inject malicious SQL. While this update fixes how
PQescapeString operates, the PostgreSQL server has also been modified to
prevent such an attack occurring through unpatched clients.
(CVE-2006-2313, CVE-2006-2314). More details about this issue are
available in the linked PostgreSQL technical documentation.

An integer signedness bug was found in the way PostgreSQL generated
password salts. The actual salt size is only half the size of the expected
salt, making the process of brute forcing password hashes slightly easier.
This update will not strengthen already existing passwords, but all newly
assigned passwords will have the proper salt length. (CVE-2006-0591)

Users of PostgreSQL should upgrade to these updated packages containing
PostgreSQL version 7.4.13, which corrects these issues.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2006-May/075068.html
https://lists.centos.org/pipermail/centos-announce/2006-May/075069.html
https://lists.centos.org/pipermail/centos-announce/2006-May/075072.html
https://lists.centos.org/pipermail/centos-announce/2006-May/075073.html
https://lists.centos.org/pipermail/centos-announce/2006-May/075075.html
https://lists.centos.org/pipermail/centos-announce/2006-May/075076.html
https://lists.centos.org/pipermail/centos-announce/2006-May/075077.html
https://lists.centos.org/pipermail/centos-announce/2006-May/075087.html
https://lists.centos.org/pipermail/centos-announce/2006-May/075088.html

Affected packages:
postgresql
postgresql-contrib
postgresql-devel
postgresql-docs
postgresql-jdbc
postgresql-libs
postgresql-pl
postgresql-python
postgresql-server
postgresql-tcl
postgresql-test
rh-postgresql
rh-postgresql-contrib
rh-postgresql-devel
rh-postgresql-docs
rh-postgresql-jdbc
rh-postgresql-libs
rh-postgresql-pl
rh-postgresql-python
rh-postgresql-server
rh-postgresql-tcl
rh-postgresql-test

Upstream details at:
https://access.redhat.com/errata/RHSA-2006:0526

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.012

Percentile

85.2%