what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

OpenPKG Security Advisory 2006.4

OpenPKG Security Advisory 2006.4
Posted Feb 20, 2006
Authored by OpenPKG Foundation | Site openpkg.org

OpenPKG Security Advisory - According to vendor security information [0], privilege escalation vulnerabilities exist in the PostgreSQL RDBMS [1] before version 8.1.3. The bug allowed any logged-in user to "SET ROLE" to any other database user id. Due to inadequate validity checking, a user could exploit the special case that "SET ROLE" normally uses to restore the previous role setting after an error. This allowed ordinary users to acquire superuser status, for example.

tags | advisory, vulnerability
SHA-256 | c40cab37f34f78513b56727208269fd48812b531d971509e3a808ace7e30a5b9

OpenPKG Security Advisory 2006.4

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

OpenPKG Security Advisory The OpenPKG Project
http://www.openpkg.org/security.html http://www.openpkg.org
openpkg-security@openpkg.org openpkg@openpkg.org
OpenPKG-SA-2006.004 19-Feb-2006
________________________________________________________________________

Package: postgresql
Vulnerability: privilege escalation
OpenPKG Specific: no

Affected Releases: Affected Packages: Corrected Packages:
OpenPKG CURRENT <= postgresql-8.1.2-20060211 >= postgresql-8.1.3-20060213
OpenPKG 2.5 <= postgresql-8.0.4-2.5.0 >= postgresql-8.0.4-2.5.1
OpenPKG 2.4 <= postgresql-8.0.3-2.4.0 >= postgresql-8.0.3-2.4.1
OpenPKG 2.3 <= postgresql-8.0.1-2.3.1 >= postgresql-8.0.1-2.3.2

Description:
According to vendor security information [0], privilege escalation
vulnerabilitiesd exist in the PostgreSQL RDBMS [1] before version
8.1.3. The bug allowed any logged-in user to "SET ROLE" to any other
database user id. Due to inadequate validity checking, a user could
exploit the special case that "SET ROLE" normally uses to restore the
previous role setting after an error. This allowed ordinary users to
acquire superuser status, for example. The Common Vulnerabilities
and Exposures (CVE) project assigned the id CVE-2006-0553 [2] to the
problem.

The escalation of privilege risk exists only in versions 8.1.0 to
8.1.2. However, in all versions back to 7.3 there is a related bug in
"SET SESSION AUTHORIZATION" that allows unprivileged users to crash
the server, if it has been compiled with Asserts enabled (which is not
the default).
________________________________________________________________________

References:
[0] http://www.postgresql.org/docs/8.1/static/release.html#RELEASE-8-1-3
[1] http://www.postgresql.org/
[2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0553
________________________________________________________________________

For security reasons, this advisory was digitally signed with the
OpenPGP public key "OpenPKG <openpkg@openpkg.org>" (ID 63C4CB9F) of the
OpenPKG project which you can retrieve from http://pgp.openpkg.org and
hkp://pgp.openpkg.org. Follow the instructions on http://pgp.openpkg.org/
for details on how to verify the integrity of this advisory.
________________________________________________________________________

-----BEGIN PGP SIGNATURE-----
Comment: OpenPKG <openpkg@openpkg.org>

iD8DBQFD+FhfgHWT4GPEy58RAoF3AKCrvXGfM2EhKrayDMuaTG3DLGL4fQCgyyl/
+1Qgcz5MZhew1F+8KGz0C1Q=
=5J9V
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    13 Files
  • 22
    Mar 22nd
    5 Files
  • 23
    Mar 23rd
    6 Files
  • 24
    Mar 24th
    47 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    50 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close