SB2017070807 - Multiple vulnerabilities in PostgreSQL
Published: July 8, 2017 Updated: June 24, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Use-after-free (CVE-ID: CVE-2017-10966)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to use-after-free error when incorrectly using GHashTable interface while updating internal nick list. A remote unauthenticated attacker can create a specially crafted nick name and crash the affected server or execute arbitrary code.
Successful exploitation of the vulnerability may result in remote code execution.
2) Resource management error (CVE-ID: CVE-2009-0922)
The vulnerability allows a remote user to perform service disruption.
PostgreSQL before 8.3.7, 8.2.13, 8.1.17, 8.0.21, and 7.4.25 allows remote authenticated users to cause a denial of service (stack consumption and crash) by triggering a failure in the conversion of a localized error message to a client-specified encoding, as demonstrated using mismatched encoding conversion requests. Per: https://bugzilla.redhat.com/show_bug.cgi?id=488156 "PostgreSQL allows remote authenticated users to cause a momentary denial of service (crash due to stack consumption) when there is a failure to convert a localized error message to the client-specified encoding. In releases 8.3.6, 8.2.12, 8.1.16. 8.0.20, and 7.4.24, a trivial misconfiguration is sufficient to provoke a crash. In older releases it is necessary to select a locale and client encoding for which specific messages fail to translate, and so a given installation may or may not be vulnerable depending on the administrator-determined locale setting. Releases 8.3.7, 8.2.13, 8.1.17, 8.0.21, and 7.4.25 are secure against all known variants of this issue."
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=2cb39ad721267f5b8898c4f6302ffeb5e6088d1a
- https://git.alpinelinux.org/aports/commit/?id=52d4d14ef14530f33217fa687536a6af4f680de9
- https://git.alpinelinux.org/aports/commit/?id=eecd5912823c501ff930d70cd18171540efa79ba
- https://git.alpinelinux.org/aports/commit/?id=255a2e7c04fb35198c757ec5e35769516dee9ef9
- http://archives.postgresql.org//pgsql-bugs/2009-02/msg00176.php
- http://archives.postgresql.org/pgsql-bugs/2009-02/msg00172.php
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=517405
- http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html
- http://marc.info/?l=bugtraq&m=134124585221119&w=2
- http://secunia.com/advisories/34453
- http://secunia.com/advisories/35100
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-258808-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020455.1-1
- http://wiki.rpath.com/Advisories:rPSA-2009-0086
- http://www.mandriva.com/security/advisories?name=MDVSA-2009:079
- http://www.openwall.com/lists/oss-security/2009/03/11/4
- http://www.postgresql.org/about/news.1065
- http://www.redhat.com/support/errata/RHSA-2009-1067.html
- http://www.securityfocus.com/archive/1/503598/100/0/threaded
- http://www.securityfocus.com/bid/34090
- http://www.securitytracker.com/id?1021860
- http://www.vupen.com/english/advisories/2009/0767
- http://www.vupen.com/english/advisories/2009/1316
- https://bugzilla.redhat.com/show_bug.cgi?id=488156
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10874
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6252
- https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00810.html
- https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00843.html