Family: Mandrake Local Security Checks --> Category: infos
MDKSA-2005:093: postgresql Vulnerability Scan
Vulnerability Scan Summary
Check for the version of the postgresql package
Detailed Explanation for this Vulnerability Test
The remote host is missing the patch for the advisory MDKSA-2005:093 (postgresql).
A number of vulnerabilities were found and corrected in the PostgreSQL DBMS:
Two serious security errors have been found in PostgreSQL 7.3 and newer
releases. These errors at least allow an unprivileged database user to crash
the backend process, and may make it possible for an unprivileged user to gain
the rights of a database superuser.
Functions that support client-to-server character set conversion can be called
from SQL commands by unprivileged users, but these functions are not designed
to be safe against malicious choices of argument values. (CVE-2005-1409)
The contrib/tsearch2 module misdeclares several functions as returning type
'internal' when they do not have any 'internal' argument. This breaks the type
safety of 'internal' by allowing users to construct SQL commands that invoke
other functions accepting 'internal' arguments. (CVE-2005-1410)
These vulnerabilities must also be fixed in all existing databases when
upgrading. The post-installation script of the updated postgresql-server
package attempts to do this automatically.
The updated packages have been patched to correct these problems.
Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:093
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.