Lucene search

K
nessusThis script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.SL_20110203_POSTGRESQL_ON_SL4_X.NASL
HistoryAug 01, 2012 - 12:00 a.m.

Scientific Linux Security Update : postgresql on SL4.x, SL5.x i386/x86_64

2012-08-0100:00:00
This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
10

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.019 Low

EPSS

Percentile

88.5%

A stack-based buffer overflow flaw was found in the way PostgreSQL processed certain tokens from a SQL query when the intarray module was enabled on a particular database. An authenticated database user running a specially crafted SQL query could use this flaw to cause a temporary denial of service (postgres daemon crash) or, potentially, execute arbitrary code with the privileges of the database server.
(CVE-2010-4015)

For Scientific Linux 4, the updated postgresql packages contain a backported patch for this issue; there are no other changes.

For Scientific Linux 5, the updated postgresql packages upgrade PostgreSQL to version 8.1.23, and contain a backported patch for this issue. Refer to the PostgreSQL Release Notes for a full list of changes :

http://www.postgresql.org/docs/8.1/static/release.html

If the postgresql service is running, it will be automatically restarted after installing this update.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text is (C) Scientific Linux.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(60951);
  script_version("1.8");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/14");

  script_cve_id("CVE-2010-4015");

  script_name(english:"Scientific Linux Security Update : postgresql on SL4.x, SL5.x i386/x86_64");
  script_summary(english:"Checks rpm output for the updated packages");

  script_set_attribute(
    attribute:"synopsis", 
    value:
"The remote Scientific Linux host is missing one or more security
updates."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"A stack-based buffer overflow flaw was found in the way PostgreSQL
processed certain tokens from a SQL query when the intarray module was
enabled on a particular database. An authenticated database user
running a specially crafted SQL query could use this flaw to cause a
temporary denial of service (postgres daemon crash) or, potentially,
execute arbitrary code with the privileges of the database server.
(CVE-2010-4015)

For Scientific Linux 4, the updated postgresql packages contain a
backported patch for this issue; there are no other changes.

For Scientific Linux 5, the updated postgresql packages upgrade
PostgreSQL to version 8.1.23, and contain a backported patch for this
issue. Refer to the PostgreSQL Release Notes for a full list of
changes :

http://www.postgresql.org/docs/8.1/static/release.html

If the postgresql service is running, it will be automatically
restarted after installing this update."
  );
  # http://www.postgresql.org/docs/8.1/static/release.html
  script_set_attribute(
    attribute:"see_also",
    value:"https://www.postgresql.org/docs/8.1/release.html"
  );
  # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1102&L=scientific-linux-errata&T=0&P=354
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?356de122"
  );
  script_set_attribute(attribute:"solution", value:"Update the affected packages.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"x-cpe:/o:fermilab:scientific_linux");

  script_set_attribute(attribute:"patch_publication_date", value:"2011/02/03");
  script_set_attribute(attribute:"plugin_publication_date", value:"2012/08/01");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"Scientific Linux Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/RedHat/release", "Host/RedHat/rpm-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("rpm.inc");


if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Scientific Linux " >!< release) audit(AUDIT_HOST_NOT, "running Scientific Linux");
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);

cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if (cpu >!< "x86_64" && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Scientific Linux", cpu);


flag = 0;
if (rpm_check(release:"SL4", reference:"postgresql-7.4.30-1.el4_8.2")) flag++;
if (rpm_check(release:"SL4", reference:"postgresql-contrib-7.4.30-1.el4_8.2")) flag++;
if (rpm_check(release:"SL4", reference:"postgresql-devel-7.4.30-1.el4_8.2")) flag++;
if (rpm_check(release:"SL4", reference:"postgresql-docs-7.4.30-1.el4_8.2")) flag++;
if (rpm_check(release:"SL4", reference:"postgresql-jdbc-7.4.30-1.el4_8.2")) flag++;
if (rpm_check(release:"SL4", reference:"postgresql-libs-7.4.30-1.el4_8.2")) flag++;
if (rpm_check(release:"SL4", reference:"postgresql-pl-7.4.30-1.el4_8.2")) flag++;
if (rpm_check(release:"SL4", reference:"postgresql-python-7.4.30-1.el4_8.2")) flag++;
if (rpm_check(release:"SL4", reference:"postgresql-server-7.4.30-1.el4_8.2")) flag++;
if (rpm_check(release:"SL4", reference:"postgresql-tcl-7.4.30-1.el4_8.2")) flag++;
if (rpm_check(release:"SL4", reference:"postgresql-test-7.4.30-1.el4_8.2")) flag++;

if (rpm_check(release:"SL5", reference:"postgresql-8.1.23-1.el5_6.1")) flag++;
if (rpm_check(release:"SL5", reference:"postgresql-contrib-8.1.23-1.el5_6.1")) flag++;
if (rpm_check(release:"SL5", reference:"postgresql-devel-8.1.23-1.el5_6.1")) flag++;
if (rpm_check(release:"SL5", reference:"postgresql-docs-8.1.23-1.el5_6.1")) flag++;
if (rpm_check(release:"SL5", reference:"postgresql-libs-8.1.23-1.el5_6.1")) flag++;
if (rpm_check(release:"SL5", reference:"postgresql-pl-8.1.23-1.el5_6.1")) flag++;
if (rpm_check(release:"SL5", reference:"postgresql-python-8.1.23-1.el5_6.1")) flag++;
if (rpm_check(release:"SL5", reference:"postgresql-server-8.1.23-1.el5_6.1")) flag++;
if (rpm_check(release:"SL5", reference:"postgresql-tcl-8.1.23-1.el5_6.1")) flag++;
if (rpm_check(release:"SL5", reference:"postgresql-test-8.1.23-1.el5_6.1")) flag++;


if (flag)
{
  if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
  else security_warning(0);
  exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
VendorProductVersionCPE
fermilabscientific_linuxx-cpe:/o:fermilab:scientific_linux

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.019 Low

EPSS

Percentile

88.5%