Family: Mandrake Local Security Checks --> Category: infos
MDKSA-2007:037-1: postgresql Vulnerability Scan
Vulnerability Scan Summary
Check for the version of the postgresql package
Detailed Explanation for this Vulnerability Test
The remote host is missing the patch for the advisory MDKSA-2007:037-1 (postgresql).
Jeff Trout discovered that the PostgreSQL server did not sufficiently
check data types of SQL function arguments in some cases. A user could
then exploit this to crash the database server or read out arbitrary
locations of the server's memory, which could be used to retrieve
database contents that the user should not be able to see. Note that a
user must be authenticated in order to exploit this (CVE-2007-0555).
As well, Jeff Trout also discovered that the query planner did not
verify that a table was still compatible with a previously-generated
query plan, which could be exploted to read out arbitrary locations of
the server's memory by using ALTER COLUMN TYPE during query execution.
Again, a user must be authenticated in order to exploit this
The previous update updated PostgreSQL to upstream versions, including
8.1.7 which contained a bug with typemod data types used with check
constraints and expression indexes. This regression has been corrected
in the new 8.1.8 version that is being provided.
Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2007:037-1
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.