Vulnerability Scanning Solutions, LLC.
Our Process
What We Scan For
Sample Report
Client List
Contact Us
What We Scan For
Family: Mandrake Local Security Checks --> Category: infos

MDKSA-2005:093: postgresql Vulnerability Scan

Vulnerability Scan Summary
Check for the version of the postgresql package

Detailed Explanation for this Vulnerability Test

The remote host is missing the patch for the advisory MDKSA-2005:093 (postgresql).

A number of vulnerabilities were found and corrected in the PostgreSQL DBMS:

Two serious security errors have been found in PostgreSQL 7.3 and newer
releases. These errors at least allow an unprivileged database user to crash
the backend process, and may make it possible for an unprivileged user to gain
the rights of a database superuser.

Functions that support client-to-server character set conversion can be called
from SQL commands by unprivileged users, but these functions are not designed
to be safe against malicious choices of argument values. (CVE-2005-1409)

The contrib/tsearch2 module misdeclares several functions as returning type
'internal' when they do not have any 'internal' argument. This breaks the type
safety of 'internal' by allowing users to construct SQL commands that invoke
other functions accepting 'internal' arguments. (CVE-2005-1410)

These vulnerabilities must also be fixed in all existing databases when
upgrading. The post-installation script of the updated postgresql-server
package attempts to do this automatically.

The updated packages have been patched to correct these problems.

Solution :
Threat Level: High

Click HERE for more information and discussions on this network vulnerability scan.


P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.