#VU9169 Improper access control in PostgreSQL


Published: 2017-11-10

Vulnerability identifier: #VU9169

Vulnerability risk: Low

CVSSv3.1: 2.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-12172

CWE-ID: CWE-264

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
PostgreSQL
Server applications / Database software

Vendor: PostgreSQL Global Development Group

Description
The vulnerability allows a local attacker to cause DoS condition or obtain potentially sensitive information on a targeted system.

The weakness exists due to a flaw in certain non-default startup scripts. A local attacker with the privileges of the database server can create a symbolic link from the $PGLOG file to a critical file and modify the target file.

Mitigation
Update to version 9.6.6.

Vulnerable software versions

PostgreSQL: 9.6.0 - 9.6.5, 9.5.0 - 9.5.8, 9.4.0 - 9.4.13


External links
http://www.postgresql.org/docs/current/static/release-9-6-6.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability