Amazon Linux AMI update for postgresql96

Published: 2018-12-07 10:03:30 | Updated: 2018-12-07
Severity Low
Patch available YES
Number of vulnerabilities 3
CVE ID CVE-2018-10925
CVE-2018-10915
CVE-2018-1115
CVSSv3 3.8 [CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
6.4 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H/E:U/RL:O/RC:C]
CWE ID CWE-200
CWE-89
CWE-284
Exploitation vector Network
Public exploit N/A
Vulnerable software Amazon Linux AMI
Vulnerable software versions Amazon Linux AMI 2017.03
Vendor URL Amazon Web Services, Inc.

Security Advisory

1) Information disclosure

Description

The vulnerability allows a remote privileged attacker to obtain potentially sensitive information.

The vulnerability exists due to improper check authorization on certain statements involved with "INSERT ... ON CONFLICT DO UPDATE". A remote attacker with "CREATE TABLE" privileges can read arbitrary bytes server memory.

Remediation

Update the affected packages.

i686:
    postgresql96-devel-9.6.11-1.82.amzn1.i686
    postgresql96-test-9.6.11-1.82.amzn1.i686
    postgresql96-static-9.6.11-1.82.amzn1.i686
    postgresql96-plpython26-9.6.11-1.82.amzn1.i686
    postgresql96-debuginfo-9.6.11-1.82.amzn1.i686
    postgresql96-server-9.6.11-1.82.amzn1.i686
    postgresql96-libs-9.6.11-1.82.amzn1.i686
    postgresql96-plpython27-9.6.11-1.82.amzn1.i686
    postgresql96-plperl-9.6.11-1.82.amzn1.i686
    postgresql96-9.6.11-1.82.amzn1.i686
    postgresql96-docs-9.6.11-1.82.amzn1.i686
    postgresql96-contrib-9.6.11-1.82.amzn1.i686

src:
    postgresql96-9.6.11-1.82.amzn1.src

x86_64:
    postgresql96-contrib-9.6.11-1.82.amzn1.x86_64
    postgresql96-debuginfo-9.6.11-1.82.amzn1.x86_64
    postgresql96-static-9.6.11-1.82.amzn1.x86_64
    postgresql96-test-9.6.11-1.82.amzn1.x86_64
    postgresql96-docs-9.6.11-1.82.amzn1.x86_64
    postgresql96-libs-9.6.11-1.82.amzn1.x86_64
    postgresql96-plperl-9.6.11-1.82.amzn1.x86_64
    postgresql96-devel-9.6.11-1.82.amzn1.x86_64
    postgresql96-plpython26-9.6.11-1.82.amzn1.x86_64
    postgresql96-plpython27-9.6.11-1.82.amzn1.x86_64
    postgresql96-server-9.6.11-1.82.amzn1.x86_64
    postgresql96-9.6.11-1.82.amzn1.x86_64

External links

https://alas.aws.amazon.com/ALAS-2018-1119.html

2) SQL injection

Description

The vulnerability allows a remote attacker to execute arbitrary SQL commands in web application database.

The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can send a specially crafted HTTP request to vulnerable script and execute arbitrary SQL commands in web application database.

Successful exploitation of the vulnerability may allow an attacker to gain administrative access to vulnerable web application.

Remediation

Update the affected packages.

i686:
    postgresql96-devel-9.6.11-1.82.amzn1.i686
    postgresql96-test-9.6.11-1.82.amzn1.i686
    postgresql96-static-9.6.11-1.82.amzn1.i686
    postgresql96-plpython26-9.6.11-1.82.amzn1.i686
    postgresql96-debuginfo-9.6.11-1.82.amzn1.i686
    postgresql96-server-9.6.11-1.82.amzn1.i686
    postgresql96-libs-9.6.11-1.82.amzn1.i686
    postgresql96-plpython27-9.6.11-1.82.amzn1.i686
    postgresql96-plperl-9.6.11-1.82.amzn1.i686
    postgresql96-9.6.11-1.82.amzn1.i686
    postgresql96-docs-9.6.11-1.82.amzn1.i686
    postgresql96-contrib-9.6.11-1.82.amzn1.i686

src:
    postgresql96-9.6.11-1.82.amzn1.src

x86_64:
    postgresql96-contrib-9.6.11-1.82.amzn1.x86_64
    postgresql96-debuginfo-9.6.11-1.82.amzn1.x86_64
    postgresql96-static-9.6.11-1.82.amzn1.x86_64
    postgresql96-test-9.6.11-1.82.amzn1.x86_64
    postgresql96-docs-9.6.11-1.82.amzn1.x86_64
    postgresql96-libs-9.6.11-1.82.amzn1.x86_64
    postgresql96-plperl-9.6.11-1.82.amzn1.x86_64
    postgresql96-devel-9.6.11-1.82.amzn1.x86_64
    postgresql96-plpython26-9.6.11-1.82.amzn1.x86_64
    postgresql96-plpython27-9.6.11-1.82.amzn1.x86_64
    postgresql96-server-9.6.11-1.82.amzn1.x86_64
    postgresql96-9.6.11-1.82.amzn1.x86_64

External links

https://alas.aws.amazon.com/ALAS-2018-1119.html

3) Security restrictions bypass

Description

The vulnerability allows a remote authenticated attacker to bypass security restrictions on the target system.

The weakness exists in the pg_catalog.pg_logfile_rotate() function due to improper Access Control List (ACL) restrictions as it does not follow the same ACLs as the pg_rorate_logfile function. A remote attacker can connect to the database and cause the target software to force log rotation, write log messages across arbitrary log files or cause the service to crash.

Remediation

Update the affected packages.

i686:
    postgresql96-devel-9.6.11-1.82.amzn1.i686
    postgresql96-test-9.6.11-1.82.amzn1.i686
    postgresql96-static-9.6.11-1.82.amzn1.i686
    postgresql96-plpython26-9.6.11-1.82.amzn1.i686
    postgresql96-debuginfo-9.6.11-1.82.amzn1.i686
    postgresql96-server-9.6.11-1.82.amzn1.i686
    postgresql96-libs-9.6.11-1.82.amzn1.i686
    postgresql96-plpython27-9.6.11-1.82.amzn1.i686
    postgresql96-plperl-9.6.11-1.82.amzn1.i686
    postgresql96-9.6.11-1.82.amzn1.i686
    postgresql96-docs-9.6.11-1.82.amzn1.i686
    postgresql96-contrib-9.6.11-1.82.amzn1.i686

src:
    postgresql96-9.6.11-1.82.amzn1.src

x86_64:
    postgresql96-contrib-9.6.11-1.82.amzn1.x86_64
    postgresql96-debuginfo-9.6.11-1.82.amzn1.x86_64
    postgresql96-static-9.6.11-1.82.amzn1.x86_64
    postgresql96-test-9.6.11-1.82.amzn1.x86_64
    postgresql96-docs-9.6.11-1.82.amzn1.x86_64
    postgresql96-libs-9.6.11-1.82.amzn1.x86_64
    postgresql96-plperl-9.6.11-1.82.amzn1.x86_64
    postgresql96-devel-9.6.11-1.82.amzn1.x86_64
    postgresql96-plpython26-9.6.11-1.82.amzn1.x86_64
    postgresql96-plpython27-9.6.11-1.82.amzn1.x86_64
    postgresql96-server-9.6.11-1.82.amzn1.x86_64
    postgresql96-9.6.11-1.82.amzn1.x86_64

External links

https://alas.aws.amazon.com/ALAS-2018-1119.html

Back to List