what you don't know can hurt you

Mandriva Linux Security Advisory 2012-139

Mandriva Linux Security Advisory 2012-139
Posted Aug 20, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-139 - Multiple vulnerabilities has been discovered and corrected in postgresql. libxslt offers the ability to read and write both files and URLs through stylesheet commands, thus allowing unprivileged database users to both read and write data with the privileges of the database server. xml_parse() would attempt to fetch external files or URLs as needed to resolve DTD and entity references in an XML value, thus allowing unprivileged database users to attempt to fetch data with the privileges of the database server. This advisory provides the latest versions of PostgreSQL that is not vulnerable to these issues.

tags | advisory, vulnerability
systems | linux, mandriva
advisories | CVE-2012-3488, CVE-2012-3489
MD5 | b66de77e22452889b471a5c1be59d2a1

Mandriva Linux Security Advisory 2012-139

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2012:139
http://www.mandriva.com/security/
_______________________________________________________________________

Package : postgresql
Date : August 19, 2012
Affected: 2011., Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

Multiple vulnerabilities has been discovered and corrected in
postgresql:

Prevent access to external files/URLs via contrib/xml2's xslt_process()
(Peter Eisentraut). libxslt offers the ability to read and write both
files and URLs through stylesheet commands, thus allowing unprivileged
database users to both read and write data with the privileges of the
database server. Disable that through proper use of libxslt's security
options (CVE-2012-3488). Also, remove xslt_process()'s ability to
fetch documents and stylesheets from external files/URLs. While this
was a documented feature, it was long regarded as a bad idea. The
fix for CVE-2012-3489 broke that capability, and rather than expend
effort on trying to fix it, we're just going to summarily remove it.

Prevent access to external files/URLs via XML entity references (Noah
Misch, Tom Lane). xml_parse() would attempt to fetch external files or
URLs as needed to resolve DTD and entity references in an XML value,
thus allowing unprivileged database users to attempt to fetch data
with the privileges of the database server. While the external data
wouldn't get returned directly to the user, portions of it could
be exposed in error messages if the data didn't parse as valid XML;
and in any case the mere ability to check existence of a file might
be useful to an attacker (CVE-2012-3489).

This advisory provides the latest versions of PostgreSQL that is not
vulnerable to these issues.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3488
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3489
http://www.postgresql.org/about/news/1407/
http://www.postgresql.org/docs/8.3/static/release-8-3-20.html
http://www.postgresql.org/docs/9.0/static/release-9-0-9.html
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2011:
196d4c453d0ea6c9b91a50ebb0660c94 2011/i586/libecpg9.0_6-9.0.9-0.1-mdv2011.0.i586.rpm
5a791aa21447cdfb520e2753c5bd36a1 2011/i586/libpq9.0_5-9.0.9-0.1-mdv2011.0.i586.rpm
3bbec24584ccda7e7d3c30bba1c1def0 2011/i586/postgresql9.0-9.0.9-0.1-mdv2011.0.i586.rpm
ce144f4becc8a0c562b461bcba05b922 2011/i586/postgresql9.0-contrib-9.0.9-0.1-mdv2011.0.i586.rpm
3310b81e20f7d2d562fd98f982c68e28 2011/i586/postgresql9.0-devel-9.0.9-0.1-mdv2011.0.i586.rpm
cacace6acc9fd05e020a430d4c091383 2011/i586/postgresql9.0-docs-9.0.9-0.1-mdv2011.0.i586.rpm
20ae65681ecd7ac3e40edb247d0b1d2e 2011/i586/postgresql9.0-pl-9.0.9-0.1-mdv2011.0.i586.rpm
5bebf45d073b818304bc66d2f4eda39c 2011/i586/postgresql9.0-plperl-9.0.9-0.1-mdv2011.0.i586.rpm
8c5b2d6cdc797d9b7f8ba2f1dee783ed 2011/i586/postgresql9.0-plpgsql-9.0.9-0.1-mdv2011.0.i586.rpm
b0a03b213b5db60fafbc86a592599155 2011/i586/postgresql9.0-plpython-9.0.9-0.1-mdv2011.0.i586.rpm
a20c98e08cc2c388b6e233ee0517a230 2011/i586/postgresql9.0-pltcl-9.0.9-0.1-mdv2011.0.i586.rpm
c53a458d42a14780e03e403903a5319b 2011/i586/postgresql9.0-server-9.0.9-0.1-mdv2011.0.i586.rpm
36fa3265c3f4d9b5c65a91b592443a8d 2011/SRPMS/postgresql9.0-9.0.9-0.1.src.rpm

Mandriva Linux 2011/X86_64:
2ae73fbfca7b001b81f8a4c410756585 2011/x86_64/lib64ecpg9.0_6-9.0.9-0.1-mdv2011.0.x86_64.rpm
9f2c53c2780cd5df8ab7fe10e20abf66 2011/x86_64/lib64pq9.0_5-9.0.9-0.1-mdv2011.0.x86_64.rpm
49d5fe371c007064449ba8c11e908751 2011/x86_64/postgresql9.0-9.0.9-0.1-mdv2011.0.x86_64.rpm
cb0fda294ac239e0cb8e5463103d9076 2011/x86_64/postgresql9.0-contrib-9.0.9-0.1-mdv2011.0.x86_64.rpm
b0f33c74737d0f129d8572c1f0b3a493 2011/x86_64/postgresql9.0-devel-9.0.9-0.1-mdv2011.0.x86_64.rpm
b7fb440ae36b85113065b54e79734b5e 2011/x86_64/postgresql9.0-docs-9.0.9-0.1-mdv2011.0.x86_64.rpm
d20fd9536064d6636cddc97152639fbf 2011/x86_64/postgresql9.0-pl-9.0.9-0.1-mdv2011.0.x86_64.rpm
5760bba871a780691bdf95103aea5fd8 2011/x86_64/postgresql9.0-plperl-9.0.9-0.1-mdv2011.0.x86_64.rpm
d6adff0aa5363abe028cb7d2c60e189f 2011/x86_64/postgresql9.0-plpgsql-9.0.9-0.1-mdv2011.0.x86_64.rpm
e6f876785888e982e6e9548f806a940d 2011/x86_64/postgresql9.0-plpython-9.0.9-0.1-mdv2011.0.x86_64.rpm
f7c3d0352a4b7d6447b968b6cc5f0671 2011/x86_64/postgresql9.0-pltcl-9.0.9-0.1-mdv2011.0.x86_64.rpm
e0131e91fcfc39360147b344a31ec190 2011/x86_64/postgresql9.0-server-9.0.9-0.1-mdv2011.0.x86_64.rpm
36fa3265c3f4d9b5c65a91b592443a8d 2011/SRPMS/postgresql9.0-9.0.9-0.1.src.rpm

Mandriva Enterprise Server 5:
71a6b864aaf665b5a5c611be01639222 mes5/i586/libecpg8.3_6-8.3.20-0.1mdvmes5.2.i586.rpm
375780b34c97dedb5e3427ecad37fe54 mes5/i586/libpq8.3_5-8.3.20-0.1mdvmes5.2.i586.rpm
59879d7760529cf3f8eb41e387f47ce4 mes5/i586/postgresql8.3-8.3.20-0.1mdvmes5.2.i586.rpm
c943954b66132a7eeba9fc65b91c4a44 mes5/i586/postgresql8.3-contrib-8.3.20-0.1mdvmes5.2.i586.rpm
1fd7ed02e874d6194625c6a481a382c3 mes5/i586/postgresql8.3-devel-8.3.20-0.1mdvmes5.2.i586.rpm
c8b7c6256d309c95779715cb6cfb1360 mes5/i586/postgresql8.3-docs-8.3.20-0.1mdvmes5.2.i586.rpm
e2706137d16e6fb0ad22423778838b92 mes5/i586/postgresql8.3-pl-8.3.20-0.1mdvmes5.2.i586.rpm
832605f323cb055d87399bf31bf9054e mes5/i586/postgresql8.3-plperl-8.3.20-0.1mdvmes5.2.i586.rpm
29c0c27a8c94584d7eb67fde4d59b41d mes5/i586/postgresql8.3-plpgsql-8.3.20-0.1mdvmes5.2.i586.rpm
b95973e404fc93fbeab6e7bb6ab8af11 mes5/i586/postgresql8.3-plpython-8.3.20-0.1mdvmes5.2.i586.rpm
555a9ade690cb3c819bfab261a079b1e mes5/i586/postgresql8.3-pltcl-8.3.20-0.1mdvmes5.2.i586.rpm
638b114fc547941a1370330625128eb8 mes5/i586/postgresql8.3-server-8.3.20-0.1mdvmes5.2.i586.rpm
5ebe09e835e80ed707b7cde6d2b3e604 mes5/SRPMS/postgresql8.3-8.3.20-0.1mdvmes5.2.src.rpm

Mandriva Enterprise Server 5/X86_64:
7dc4e838cc0a297b4bf8edc141433823 mes5/x86_64/lib64ecpg8.3_6-8.3.20-0.1mdvmes5.2.x86_64.rpm
e7023ffaf92f90f9c8fc9fe66680fac4 mes5/x86_64/lib64pq8.3_5-8.3.20-0.1mdvmes5.2.x86_64.rpm
3730cd0adf89537d44153fe147714067 mes5/x86_64/postgresql8.3-8.3.20-0.1mdvmes5.2.x86_64.rpm
9bf71ccef0a419b4852d2836edbeae66 mes5/x86_64/postgresql8.3-contrib-8.3.20-0.1mdvmes5.2.x86_64.rpm
3d4354bf90b86a6fc67337d96f20f17a mes5/x86_64/postgresql8.3-devel-8.3.20-0.1mdvmes5.2.x86_64.rpm
f0b220ef98af65bc84f63c0983a15805 mes5/x86_64/postgresql8.3-docs-8.3.20-0.1mdvmes5.2.x86_64.rpm
42ccaa371cfc58997bd321a4fcc0d4e7 mes5/x86_64/postgresql8.3-pl-8.3.20-0.1mdvmes5.2.x86_64.rpm
761a8157ece7989e00f21b6a18a5ab27 mes5/x86_64/postgresql8.3-plperl-8.3.20-0.1mdvmes5.2.x86_64.rpm
51b264d1ed8ad7bfc06bdfdd77c172d1 mes5/x86_64/postgresql8.3-plpgsql-8.3.20-0.1mdvmes5.2.x86_64.rpm
373686640467c04242bcb824f5471097 mes5/x86_64/postgresql8.3-plpython-8.3.20-0.1mdvmes5.2.x86_64.rpm
382654b56d495ee4d1d680c8a7ee3a98 mes5/x86_64/postgresql8.3-pltcl-8.3.20-0.1mdvmes5.2.x86_64.rpm
63bb9469727b0deb3ee368bd70cb1523 mes5/x86_64/postgresql8.3-server-8.3.20-0.1mdvmes5.2.x86_64.rpm
5ebe09e835e80ed707b7cde6d2b3e604 mes5/SRPMS/postgresql8.3-8.3.20-0.1mdvmes5.2.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFQMK/dmqjQ0CJFipgRAv1SAKCVJZuA6JrpfmjlRD1MA5MLXsraBgCgviAU
vWkQPsW68PugeHxcB8/AkvI=
=deHH
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

October 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    16 Files
  • 2
    Oct 2nd
    1 Files
  • 3
    Oct 3rd
    1 Files
  • 4
    Oct 4th
    24 Files
  • 5
    Oct 5th
    24 Files
  • 6
    Oct 6th
    11 Files
  • 7
    Oct 7th
    14 Files
  • 8
    Oct 8th
    19 Files
  • 9
    Oct 9th
    1 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    7 Files
  • 12
    Oct 12th
    15 Files
  • 13
    Oct 13th
    26 Files
  • 14
    Oct 14th
    10 Files
  • 15
    Oct 15th
    6 Files
  • 16
    Oct 16th
    2 Files
  • 17
    Oct 17th
    1 Files
  • 18
    Oct 18th
    14 Files
  • 19
    Oct 19th
    15 Files
  • 20
    Oct 20th
    20 Files
  • 21
    Oct 21st
    12 Files
  • 22
    Oct 22nd
    14 Files
  • 23
    Oct 23rd
    3 Files
  • 24
    Oct 24th
    1 Files
  • 25
    Oct 25th
    33 Files
  • 26
    Oct 26th
    27 Files
  • 27
    Oct 27th
    6 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close