Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.882213
Category:CentOS Local Security Checks
Title:CentOS Update for postgresql CESA-2015:1194 centos7
Summary:Check the version of postgresql
Description:Summary:
Check the version of postgresql

Vulnerability Insight:
PostgreSQL is an advanced object-relational
database management system (DBMS).

A double-free flaw was found in the connection handling. An unauthenticated
attacker could exploit this flaw to crash the PostgreSQL back end by
disconnecting at approximately the same time as the authentication time out
is triggered. (CVE-2015-3165)

It was discovered that PostgreSQL did not properly check the return values
of certain standard library functions. If the system is in a state that
would cause the standard library functions to fail, for example memory
exhaustion, an authenticated user could exploit this flaw to disclose
partial memory contents or cause the GSSAPI authentication to use an
incorrect keytab file. (CVE-2015-3166)

It was discovered that the pgcrypto module could return different error
messages when decrypting certain data with an incorrect key. This can help
an authenticated user to launch a possible cryptographic attack, although
no suitable attack is currently known. (CVE-2015-3167)

Red Hat would like to thank the PostgreSQL project for reporting these
issues. Upstream acknowledges Benkocs Norbert Attila as the original
reporter of CVE-2015-3165 and Noah Misch as the original reporter of
CVE-2015-3166 and CVE-2015-3167.

All PostgreSQL users are advised to upgrade to these updated packages,
which contain backported patches to correct these issues. If the
postgresql service is running, it will be automatically restarted after
installing this update.

Affected Software/OS:
postgresql on CentOS 7

Solution:
Please install the updated packages.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2015-3165
http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html
BugTraq ID: 74787
http://www.securityfocus.com/bid/74787
Debian Security Information: DSA-3269 (Google Search)
http://www.debian.org/security/2015/dsa-3269
Debian Security Information: DSA-3270 (Google Search)
http://www.debian.org/security/2015/dsa-3270
https://security.gentoo.org/glsa/201507-20
RedHat Security Advisories: RHSA-2015:1194
http://rhn.redhat.com/errata/RHSA-2015-1194.html
RedHat Security Advisories: RHSA-2015:1195
http://rhn.redhat.com/errata/RHSA-2015-1195.html
RedHat Security Advisories: RHSA-2015:1196
http://rhn.redhat.com/errata/RHSA-2015-1196.html
http://www.ubuntu.com/usn/USN-2621-1
Common Vulnerability Exposure (CVE) ID: CVE-2015-3166
http://ubuntu.com/usn/usn-2621-1
http://www.postgresql.org/about/news/1587/
http://www.postgresql.org/docs/9.0/static/release-9-0-20.html
http://www.postgresql.org/docs/9.1/static/release-9-1-16.html
http://www.postgresql.org/docs/9.2/static/release-9-2-11.html
http://www.postgresql.org/docs/9.3/static/release-9-3-7.html
http://www.postgresql.org/docs/9.4/static/release-9-4-2.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-3167
CopyrightCopyright (C) 2015 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.