PostgreSQL is vulnerable to privilege escalation. The application does not properly check for execute permissions on the trigger functions that are marked SECURITY DEFINER
and allows an authenticated database user to call the privileged trigger function on arbitrary data by installing the trigger on an attacker-owned table.
kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
lists.opensuse.org/opensuse-updates/2012-09/msg00060.html
rhn.redhat.com/errata/RHSA-2012-0677.html
rhn.redhat.com/errata/RHSA-2012-0678.html
secunia.com/advisories/49272
secunia.com/advisories/49273
www.debian.org/security/2012/dsa-2418
www.mandriva.com/security/advisories?name=MDVSA-2012:026
www.mandriva.com/security/advisories?name=MDVSA-2012:027
www.mandriva.com/security/advisories?name=MDVSA-2012:092
www.postgresql.org/about/news/1377/
www.postgresql.org/docs/8.3/static/release-8-3-18.html
www.postgresql.org/docs/8.4/static/release-8-4-11.html
www.postgresql.org/docs/9.0/static/release-9-0-7.html
www.postgresql.org/docs/9.1/static/release-9-1-3.html
access.redhat.com/security/updates/classification/#moderate
rhn.redhat.com/errata/RHSA-2012-0677.html