SB2019062003 - Multiple vulnerabilities in PostgreSQL



SB2019062003 - Multiple vulnerabilities in PostgreSQL

Published: June 20, 2019

Security Bulletin ID SB2019062003
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Stack-based buffer overflow (CVE-ID: CVE-2019-10164)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing users passwords. A remote authenticated user can change his/her password to a specially crafted string, trigger stack-based buffer overflow and execute arbitrary code on the target system or crash the PostgreSQL process.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


2) Buffer overflow (CVE-ID: CVE-2019-10164)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing a specifically crafted message during the SCRAM authentication process in a libpq-enabled client. A remote attacker can trick the victim to connect to a malicious PostgreSQL server, trigger memory corruption and execute arbitrary code on the target client system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

Install update from vendor's website.