7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.085 Low
EPSS
Percentile
94.5%
CentOS Errata and Security Advisory CESA-2015:1194
PostgreSQL is an advanced object-relational database management system
(DBMS).
A double-free flaw was found in the connection handling. An unauthenticated
attacker could exploit this flaw to crash the PostgreSQL back end by
disconnecting at approximately the same time as the authentication time out
is triggered. (CVE-2015-3165)
It was discovered that PostgreSQL did not properly check the return values
of certain standard library functions. If the system is in a state that
would cause the standard library functions to fail, for example memory
exhaustion, an authenticated user could exploit this flaw to disclose
partial memory contents or cause the GSSAPI authentication to use an
incorrect keytab file. (CVE-2015-3166)
It was discovered that the pgcrypto module could return different error
messages when decrypting certain data with an incorrect key. This can help
an authenticated user to launch a possible cryptographic attack, although
no suitable attack is currently known. (CVE-2015-3167)
Red Hat would like to thank the PostgreSQL project for reporting these
issues. Upstream acknowledges Benkocs Norbert Attila as the original
reporter of CVE-2015-3165 and Noah Misch as the original reporter of
CVE-2015-3166 and CVE-2015-3167.
All PostgreSQL users are advised to upgrade to these updated packages,
which contain backported patches to correct these issues. If the
postgresql service is running, it will be automatically restarted after
installing this update.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2015-June/083389.html
https://lists.centos.org/pipermail/centos-announce/2015-June/083391.html
Affected packages:
postgresql
postgresql-contrib
postgresql-devel
postgresql-docs
postgresql-libs
postgresql-plperl
postgresql-plpython
postgresql-pltcl
postgresql-server
postgresql-test
postgresql-upgrade
Upstream details at:
https://access.redhat.com/errata/RHSA-2015:1194
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 6 | i686 | postgresql | < 8.4.20-3.el6_6 | postgresql-8.4.20-3.el6_6.i686.rpm |
CentOS | 6 | i686 | postgresql-contrib | < 8.4.20-3.el6_6 | postgresql-contrib-8.4.20-3.el6_6.i686.rpm |
CentOS | 6 | i686 | postgresql-devel | < 8.4.20-3.el6_6 | postgresql-devel-8.4.20-3.el6_6.i686.rpm |
CentOS | 6 | i686 | postgresql-docs | < 8.4.20-3.el6_6 | postgresql-docs-8.4.20-3.el6_6.i686.rpm |
CentOS | 6 | i686 | postgresql-libs | < 8.4.20-3.el6_6 | postgresql-libs-8.4.20-3.el6_6.i686.rpm |
CentOS | 6 | i686 | postgresql-plperl | < 8.4.20-3.el6_6 | postgresql-plperl-8.4.20-3.el6_6.i686.rpm |
CentOS | 6 | i686 | postgresql-plpython | < 8.4.20-3.el6_6 | postgresql-plpython-8.4.20-3.el6_6.i686.rpm |
CentOS | 6 | i686 | postgresql-pltcl | < 8.4.20-3.el6_6 | postgresql-pltcl-8.4.20-3.el6_6.i686.rpm |
CentOS | 6 | i686 | postgresql-server | < 8.4.20-3.el6_6 | postgresql-server-8.4.20-3.el6_6.i686.rpm |
CentOS | 6 | i686 | postgresql-test | < 8.4.20-3.el6_6 | postgresql-test-8.4.20-3.el6_6.i686.rpm |
7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.085 Low
EPSS
Percentile
94.5%