The xml_parse function in the libxml2 support in the core server component in PostgreSQL 8.3 before 8.3.20, 8.4 before 8.4.13, 9.0 before 9.0.9, and 9.1 before 9.1.5 allows remote authenticated users to determine the existence of arbitrary files or URLs, and possibly obtain file or URL content that triggers a parsing error, via an XML value that refers to (1) a DTD or (2) an entity, related to an XML External Entity (aka XXE) issue.
lists.apple.com/archives/security-announce/2013/Mar/msg00002.html
lists.opensuse.org/opensuse-updates/2012-09/msg00102.html
lists.opensuse.org/opensuse-updates/2012-10/msg00013.html
lists.opensuse.org/opensuse-updates/2012-10/msg00024.html
rhn.redhat.com/errata/RHSA-2012-1263.html
secunia.com/advisories/50635
secunia.com/advisories/50718
secunia.com/advisories/50859
secunia.com/advisories/50946
www.debian.org/security/2012/dsa-2534
www.mandriva.com/security/advisories?name=MDVSA-2012:139
www.postgresql.org/about/news/1407/
www.postgresql.org/docs/8.3/static/release-8-3-20.html
www.postgresql.org/docs/8.4/static/release-8-4-13.html
www.postgresql.org/docs/9.0/static/release-9-0-9.html
www.postgresql.org/docs/9.1/static/release-9-1-5.html
www.postgresql.org/support/security/
www.securityfocus.com/bid/55074
www.ubuntu.com/usn/USN-1542-1
blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_postgresql2
bugzilla.redhat.com/show_bug.cgi?id=849173