Lucene search

K
nessusThis script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.OPENSUSE-2013-306.NASL
HistoryJun 13, 2014 - 12:00 a.m.

openSUSE Security Update : postgresql92 (openSUSE-SU-2013:0628-1)

2014-06-1300:00:00
This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
19

CVSS2

8.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:S/C:C/I:C/A:C

EPSS

0.971

Percentile

99.8%

postgresql was updated to version 9.2.4 (bnc#812525) :

  • CVE-2013-1899: Fix insecure parsing of server command-line switches. A connection request containing a database name that begins with โ€˜-โ€™ could be crafted to damage or destroy files within the serverโ€™s data directory, even if the request is eventually rejected.

  • CVE-2013-1900: Reset OpenSSL randomness state in each postmaster child process. This avoids a scenario wherein random numbers generated by โ€˜contrib/pgcryptoโ€™ functions might be relatively easy for another database user to guess. The risk is only significant when the postmaster is configured with ssl = on but most connections donโ€™t use SSL encryption.

  • CVE-2013-1901: Make REPLICATION privilege checks test current user not authenticated user. An unprivileged database user could exploit this mistake to call pg_start_backup() or pg_stop_backup(), thus possibly interfering with creation of routine backups.

  • See the release notes for the rest of the changes:
    http://www.postgresql.org/docs/9.2/static/release-9-2-4.
    html /usr/share/doc/packages/postgresql92/HISTORY

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from openSUSE Security Update openSUSE-2013-306.
#
# The text description of this plugin is (C) SUSE LLC.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(74962);
  script_version("1.6");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");

  script_cve_id("CVE-2013-1899", "CVE-2013-1900", "CVE-2013-1901");

  script_name(english:"openSUSE Security Update : postgresql92 (openSUSE-SU-2013:0628-1)");
  script_summary(english:"Check for the openSUSE-2013-306 patch");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote openSUSE host is missing a security update."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"postgresql was updated to version 9.2.4 (bnc#812525) :

  - CVE-2013-1899: Fix insecure parsing of server
    command-line switches. A connection request containing a
    database name that begins with '-' could be crafted to
    damage or destroy files within the server's data
    directory, even if the request is eventually rejected.

  - CVE-2013-1900: Reset OpenSSL randomness state in each
    postmaster child process. This avoids a scenario wherein
    random numbers generated by 'contrib/pgcrypto' functions
    might be relatively easy for another database user to
    guess. The risk is only significant when the postmaster
    is configured with ssl = on but most connections don't
    use SSL encryption.

  - CVE-2013-1901: Make REPLICATION privilege checks test
    current user not authenticated user. An unprivileged
    database user could exploit this mistake to call
    pg_start_backup() or pg_stop_backup(), thus possibly
    interfering with creation of routine backups.

  - See the release notes for the rest of the changes:
    http://www.postgresql.org/docs/9.2/static/release-9-2-4.
    html /usr/share/doc/packages/postgresql92/HISTORY"
  );
  # http://www.postgresql.org/docs/9.2/static/release-9-2-4.html
  script_set_attribute(
    attribute:"see_also",
    value:"https://www.postgresql.org/docs/9.2/release-9-2-4.html"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.novell.com/show_bug.cgi?id=812525"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://lists.opensuse.org/opensuse-updates/2013-04/msg00045.html"
  );
  script_set_attribute(
    attribute:"solution", 
    value:"Update the affected postgresql92 packages."
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:S/C:C/I:C/A:C");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libecpg6");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libecpg6-32bit");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libecpg6-debuginfo");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libecpg6-debuginfo-32bit");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libpq5");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libpq5-32bit");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libpq5-debuginfo");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libpq5-debuginfo-32bit");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:postgresql92");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:postgresql92-contrib");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:postgresql92-contrib-debuginfo");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:postgresql92-debuginfo");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:postgresql92-debugsource");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:postgresql92-devel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:postgresql92-devel-debuginfo");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:postgresql92-libs-debugsource");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:postgresql92-plperl");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:postgresql92-plperl-debuginfo");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:postgresql92-plpython");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:postgresql92-plpython-debuginfo");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:postgresql92-pltcl");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:postgresql92-pltcl-debuginfo");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:postgresql92-server");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:postgresql92-server-debuginfo");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:12.3");

  script_set_attribute(attribute:"patch_publication_date", value:"2013/04/05");
  script_set_attribute(attribute:"plugin_publication_date", value:"2014/06/13");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"SuSE Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("rpm.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
if (release !~ "^(SUSE12\.3)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "12.3", release);
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);

ourarch = get_kb_item("Host/cpu");
if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);

flag = 0;

if ( rpm_check(release:"SUSE12.3", reference:"libecpg6-9.2.4-1.8.1") ) flag++;
if ( rpm_check(release:"SUSE12.3", reference:"libecpg6-debuginfo-9.2.4-1.8.1") ) flag++;
if ( rpm_check(release:"SUSE12.3", reference:"libpq5-9.2.4-1.8.1") ) flag++;
if ( rpm_check(release:"SUSE12.3", reference:"libpq5-debuginfo-9.2.4-1.8.1") ) flag++;
if ( rpm_check(release:"SUSE12.3", reference:"postgresql92-9.2.4-1.8.1") ) flag++;
if ( rpm_check(release:"SUSE12.3", reference:"postgresql92-contrib-9.2.4-1.8.1") ) flag++;
if ( rpm_check(release:"SUSE12.3", reference:"postgresql92-contrib-debuginfo-9.2.4-1.8.1") ) flag++;
if ( rpm_check(release:"SUSE12.3", reference:"postgresql92-debuginfo-9.2.4-1.8.1") ) flag++;
if ( rpm_check(release:"SUSE12.3", reference:"postgresql92-debugsource-9.2.4-1.8.1") ) flag++;
if ( rpm_check(release:"SUSE12.3", reference:"postgresql92-devel-9.2.4-1.8.1") ) flag++;
if ( rpm_check(release:"SUSE12.3", reference:"postgresql92-devel-debuginfo-9.2.4-1.8.1") ) flag++;
if ( rpm_check(release:"SUSE12.3", reference:"postgresql92-libs-debugsource-9.2.4-1.8.1") ) flag++;
if ( rpm_check(release:"SUSE12.3", reference:"postgresql92-plperl-9.2.4-1.8.1") ) flag++;
if ( rpm_check(release:"SUSE12.3", reference:"postgresql92-plperl-debuginfo-9.2.4-1.8.1") ) flag++;
if ( rpm_check(release:"SUSE12.3", reference:"postgresql92-plpython-9.2.4-1.8.1") ) flag++;
if ( rpm_check(release:"SUSE12.3", reference:"postgresql92-plpython-debuginfo-9.2.4-1.8.1") ) flag++;
if ( rpm_check(release:"SUSE12.3", reference:"postgresql92-pltcl-9.2.4-1.8.1") ) flag++;
if ( rpm_check(release:"SUSE12.3", reference:"postgresql92-pltcl-debuginfo-9.2.4-1.8.1") ) flag++;
if ( rpm_check(release:"SUSE12.3", reference:"postgresql92-server-9.2.4-1.8.1") ) flag++;
if ( rpm_check(release:"SUSE12.3", reference:"postgresql92-server-debuginfo-9.2.4-1.8.1") ) flag++;
if ( rpm_check(release:"SUSE12.3", cpu:"x86_64", reference:"libecpg6-32bit-9.2.4-1.8.1") ) flag++;
if ( rpm_check(release:"SUSE12.3", cpu:"x86_64", reference:"libecpg6-debuginfo-32bit-9.2.4-1.8.1") ) flag++;
if ( rpm_check(release:"SUSE12.3", cpu:"x86_64", reference:"libpq5-32bit-9.2.4-1.8.1") ) flag++;
if ( rpm_check(release:"SUSE12.3", cpu:"x86_64", reference:"libpq5-debuginfo-32bit-9.2.4-1.8.1") ) flag++;

if (flag)
{
  if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
  else security_hole(0);
  exit(0);
}
else
{
  tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "postgresql92");
}

CVSS2

8.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:S/C:C/I:C/A:C

EPSS

0.971

Percentile

99.8%