Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 4 |
CVE-ID | CVE-2005-0227 CVE-2005-0244 CVE-2005-0245 CVE-2005-0246 |
CWE-ID | CWE-749 CWE-264 CWE-122 CWE-20 |
Exploitation vector | Network |
Public exploit | Public exploit code for vulnerability #3 is available. |
Vulnerable software |
PostgreSQL Server applications / Database software |
Vendor | PostgreSQL Global Development Group |
Security Bulletin
This security bulletin contains information about 4 vulnerabilities.
EUVDB-ID: #VU111737
Risk: Medium
CVSSv4.0: 6.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2005-0227
CWE-ID:
CWE-749 - Exposed Dangerous Method or Function
Exploit availability: No
DescriptionThe vulnerability allows a remote user to compromise the affected system.
The vulnerability exists due to application allows using the LOAD command to load and execute arbitrary binaries. A remote user can execute arbitrary code on the server.
MitigationInstall updates from vendor's website.
Vulnerable software versionsPostgreSQL: 7.2 - 8.0.0
CPE2.3https://archives.postgresql.org/pgsql-bugs/2005-01/msg00269.php
https://archives.postgresql.org/pgsql-announce/2005-02/msg00000.php
https://www.debian.org/security/2005/dsa-668
https://security.gentoo.org/glsa/glsa-200502-08.xml
https://www.redhat.com/support/errata/RHSA-2005-138.html
https://www.redhat.com/support/errata/RHSA-2005-150.html
https://www.trustix.org/errata/2005/0003/
https://secunia.com/advisories/12948
https://www.novell.com/linux/security/advisories/2005_36_sudo.html
https://www.securityfocus.com/bid/12411
https://www.mandriva.com/security/advisories?name=MDKSA-2005:040
https://marc.info/?l=bugtraq&m=110726899107148&w=2
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10234
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111738
Risk: Medium
CVSSv4.0: 6.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2005-0244
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions. A remote user can bypass the EXECUTE permission check for functions by using the CREATE AGGREGATE command.
MitigationInstall updates from vendor's website.
Vulnerable software versionsPostgreSQL: 7.2 - 8.0.0
CPE2.3https://archives.postgresql.org/pgsql-hackers/2005-01/msg00922.php
https://marc.info/?l=bugtraq&m=110806034116082&w=2
https://secunia.com/advisories/12948
https://www.mandriva.com/security/advisories?name=MDKSA-2005:040
https://www.novell.com/linux/security/advisories/2005_36_sudo.html
https://www.redhat.com/support/errata/RHSA-2005-138.html
https://www.securityfocus.com/bid/12417
https://exchange.xforce.ibmcloud.com/vulnerabilities/19184
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10927
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111739
Risk: Medium
CVSSv4.0: 7.4 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2005-0245
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: Yes
DescriptionThe vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error. A remote user can pass a large number of arguments to a refcursor function (gram.y), trigger a heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsPostgreSQL: 7.2 - 8.0.0
CPE2.3https://archives.postgresql.org/pgsql-patches/2005-01/msg00216.php
https://archives.postgresql.org/pgsql-committers/2005-01/msg00298.php
https://archives.postgresql.org/pgsql-committers/2005-02/msg00049.php
https://www.debian.org/security/2005/dsa-683
https://www.redhat.com/support/errata/RHSA-2005-138.html
https://www.redhat.com/support/errata/RHSA-2005-150.html
https://secunia.com/advisories/12948
https://www.novell.com/linux/security/advisories/2005_36_sudo.html
https://www.securityfocus.com/bid/12417
https://www.mandriva.com/security/advisories?name=MDKSA-2005:040
https://marc.info/?l=bugtraq&m=110806034116082&w=2
https://exchange.xforce.ibmcloud.com/vulnerabilities/19188
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10175
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU111740
Risk: Medium
CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2005-0246
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote user can pass specially crafted arrays to the database and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
Vulnerable software versionsPostgreSQL: 7.2 - 8.0.0
CPE2.3https://archives.postgresql.org/pgsql-committers/2005-01/msg00401.php
https://www.redhat.com/support/errata/RHSA-2005-138.html
https://secunia.com/advisories/12948
https://www.novell.com/linux/security/advisories/2005_36_sudo.html
https://www.securityfocus.com/bid/12417
https://www.mandriva.com/security/advisories?name=MDKSA-2005:040
https://marc.info/?l=bugtraq&m=110806034116082&w=2
https://exchange.xforce.ibmcloud.com/vulnerabilities/19185
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10148
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.