#VU20006 Untrusted search path in PostgreSQL


Published: 2019-08-08

Vulnerability identifier: #VU20006

Vulnerability risk: Low

CVSSv3.1: 3.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-10211

CWE-ID: CWE-426

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
PostgreSQL
Server applications / Database software

Vendor: PostgreSQL Global Development Group

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to EnterpriseDB Windows installer bundles an OpenSSL library that tries to load configuration from a hard-coded location on the system. This location usually does not exists, therefore an attacker can create a folder, place malicious configuration file in it and execute the configuration.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

PostgreSQL: 11.0 - 11.4, 10.0 - 10.9, 9.6.0 - 9.6.14, 9.5 - 9.5.18, 9.4 - 9.4.23


External links
http://www.postgresql.org/about/news/1960/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability