Búsqueda de    
Vulnerabilidad   
    Buscar 219043 Descripciones CVE y
99761 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.882214
Categoría:CentOS Local Security Checks
Título:CentOS Update for postgresql CESA-2015:1194 centos6
Resumen:Check the version of postgresql
Descripción:Summary:
Check the version of postgresql

Vulnerability Insight:
PostgreSQL is an advanced object-relational
database management system (DBMS).

A double-free flaw was found in the connection handling. An unauthenticated
attacker could exploit this flaw to crash the PostgreSQL back end by
disconnecting at approximately the same time as the authentication time out
is triggered. (CVE-2015-3165)

It was discovered that PostgreSQL did not properly check the return values
of certain standard library functions. If the system is in a state that
would cause the standard library functions to fail, for example memory
exhaustion, an authenticated user could exploit this flaw to disclose
partial memory contents or cause the GSSAPI authentication to use an
incorrect keytab file. (CVE-2015-3166)

It was discovered that the pgcrypto module could return different error
messages when decrypting certain data with an incorrect key. This can help
an authenticated user to launch a possible cryptographic attack, although
no suitable attack is currently known. (CVE-2015-3167)

Red Hat would like to thank the PostgreSQL project for reporting these
issues. Upstream acknowledges Benkocs Norbert Attila as the original
reporter of CVE-2015-3165 and Noah Misch as the original reporter of
CVE-2015-3166 and CVE-2015-3167.

All PostgreSQL users are advised to upgrade to these updated packages,
which contain backported patches to correct these issues. If the
postgresql service is running, it will be automatically restarted after
installing this update.

Affected Software/OS:
postgresql on CentOS 6

Solution:
Please install the updated packages.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2015-3165
http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html
BugTraq ID: 74787
http://www.securityfocus.com/bid/74787
Debian Security Information: DSA-3269 (Google Search)
http://www.debian.org/security/2015/dsa-3269
Debian Security Information: DSA-3270 (Google Search)
http://www.debian.org/security/2015/dsa-3270
https://security.gentoo.org/glsa/201507-20
RedHat Security Advisories: RHSA-2015:1194
http://rhn.redhat.com/errata/RHSA-2015-1194.html
RedHat Security Advisories: RHSA-2015:1195
http://rhn.redhat.com/errata/RHSA-2015-1195.html
RedHat Security Advisories: RHSA-2015:1196
http://rhn.redhat.com/errata/RHSA-2015-1196.html
http://www.ubuntu.com/usn/USN-2621-1
Common Vulnerability Exposure (CVE) ID: CVE-2015-3166
http://ubuntu.com/usn/usn-2621-1
http://www.postgresql.org/about/news/1587/
http://www.postgresql.org/docs/9.0/static/release-9-0-20.html
http://www.postgresql.org/docs/9.1/static/release-9-1-16.html
http://www.postgresql.org/docs/9.2/static/release-9-2-11.html
http://www.postgresql.org/docs/9.3/static/release-9-3-7.html
http://www.postgresql.org/docs/9.4/static/release-9-4-2.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-3167
CopyrightCopyright (C) 2015 Greenbone Networks GmbH

Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2024 E-Soft Inc. Todos los derechos reservados.