postgresql -- multiple vulnerabilities
Description:
Multiple vulnerabilities had been reported in various
versions of PostgreSQL:
- The EXECUTE restrictions can be bypassed by using the
AGGREGATE function, which is missing a permissions check.
- A buffer overflow exists in gram.y which could allow an
attacker to execute arbitrary code by sending a large
number of arguments to a refcursor function, found in
gram.y
- The intagg contributed module allows an attacker to crash
the server (Denial of Service) by constructing a malicious
crafted array.
References:
Affects:
- postgresql >=7.2 <7.2.7
- postgresql >=7.3 <7.3.9
- postgresql >=7.4 <7.4.7
- postgresql >=8.0.0 <8.0.1
- postgresql-server >=7.2 <7.2.7
- postgresql-server >=7.3 <7.3.9
- postgresql-server >=7.4 <7.4.7
- postgresql-server >=8.0.0 <8.0.1
- ja-postgresql >=7.2 <7.2.7
- ja-postgresql >=7.3 <7.3.9
- ja-postgresql >=7.4 <7.4.7
- ja-postgresql >=8.0.0 <8.0.1
portaudit: postgresql -- multiple vulnerabilities
Disclaimer: The data contained on this page is derived from the VuXML document,
please refer to the the original document for copyright information. The author of
portaudit makes no claim of authorship or ownership of any of the information contained herein.
If you have found a vulnerability in a FreeBSD port not listed in the
database, please contact the
FreeBSD Security Officer. Refer to
"FreeBSD Security
Information" for more information.
Oliver Eikemeier <eik@FreeBSD.org>