SB2005020101 - Multiple vulnerabilities in PostgreSQL
Published: February 1, 2005 Updated: June 21, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Exposed dangerous method or function (CVE-ID: CVE-2005-0227)
The vulnerability allows a remote user to compromise the affected system.
The vulnerability exists due to application allows using the LOAD command to load and execute arbitrary binaries. A remote user can execute arbitrary code on the server.
2) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2005-0244)
The vulnerability allows a remote user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions. A remote user can bypass the EXECUTE permission check for functions by using the CREATE AGGREGATE command.
3) Heap-based buffer overflow (CVE-ID: CVE-2005-0245)
The vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error. A remote user can pass a large number of arguments to a refcursor function (gram.y), trigger a heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
4) Input validation error (CVE-ID: CVE-2005-0246)
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote user can pass specially crafted arrays to the database and perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- http://archives.postgresql.org/pgsql-bugs/2005-01/msg00269.php
- http://archives.postgresql.org/pgsql-announce/2005-02/msg00000.php
- http://www.debian.org/security/2005/dsa-668
- http://security.gentoo.org/glsa/glsa-200502-08.xml
- http://www.redhat.com/support/errata/RHSA-2005-138.html
- http://www.redhat.com/support/errata/RHSA-2005-150.html
- http://www.trustix.org/errata/2005/0003/
- http://secunia.com/advisories/12948
- http://www.novell.com/linux/security/advisories/2005_36_sudo.html
- http://www.securityfocus.com/bid/12411
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:040
- http://marc.info/?l=bugtraq&m=110726899107148&w=2
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10234
- http://archives.postgresql.org/pgsql-hackers/2005-01/msg00922.php
- http://marc.info/?l=bugtraq&m=110806034116082&w=2
- http://www.securityfocus.com/bid/12417
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19184
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10927
- http://archives.postgresql.org/pgsql-patches/2005-01/msg00216.php
- http://archives.postgresql.org/pgsql-committers/2005-01/msg00298.php
- http://archives.postgresql.org/pgsql-committers/2005-02/msg00049.php
- http://www.debian.org/security/2005/dsa-683
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19188
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10175
- http://archives.postgresql.org/pgsql-committers/2005-01/msg00401.php
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19185
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10148