Permissions, Privileges, and Access Controls in postgresql (Alpine package)



Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2019-10130
CWE-ID CWE-264
Exploitation vector Network
Public exploit N/A
Vulnerable software
postgresql (Alpine package)
Operating systems & Components / Operating system package or component

Vendor Alpine Linux Development Team

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU18424

Risk: Low

CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2019-10130

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass certain security restrictions.

The vulnerability exists due to incorrect implementation of row security policies. A remote attacker can use statistics, generated for tables to bypass row security policies and gain access to restricted rows.

Mitigation

Install update from vendor's website.

Vulnerable software versions

postgresql (Alpine package): 9.4.4-r0 - 9.6.12-r0

CPE2.3 External links

https://git.alpinelinux.org/aports/commit/?id=2b95c8929982c3ff86b48ffe921cf9ddff6aeebd
https://git.alpinelinux.org/aports/commit/?id=5f580c412de14f7329bf77293a1c8bbce8a74d48
https://git.alpinelinux.org/aports/commit/?id=f0bd10f20b351a67282e252cb17bc8a175732c8b
https://git.alpinelinux.org/aports/commit/?id=6a033ac469647786c8b26d97bc6fad0fa1d35eac
https://git.alpinelinux.org/aports/commit/?id=dcb2fb74df0bbd2b96eca88070ab7e10ab8a38e1
https://git.alpinelinux.org/aports/commit/?id=0ce51efa7e896396543355530cdf113bcb648bc0
https://git.alpinelinux.org/aports/commit/?id=2b1e41ba04b72d78488d8ed2719c535d19313255
https://git.alpinelinux.org/aports/commit/?id=3c20033f75ab5c8b506ad5e4acb3438626aff953
https://git.alpinelinux.org/aports/commit/?id=7cf139bac41c8f2e1885d5f99334daeaeb059ac3


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###