VID |
25197 |
Severity |
40 |
Port |
5432 |
Protocol |
TCP |
Class |
DB |
Detailed Description |
The PostgreSQL server, according to its version number, has multiple vulnerabilities. PostgreSQL is a Object-Relational database management system (DBMS) that supports an extended subset of SQL.
The version of PostgreSQL installed on the remote host is 9.5.x prior to 9.5.4. It is, therefore, affected by multiple vulnerabilities :
- A denial of service vulnerability exists that allows an authenticated, remote attacker to crash the database via specially crafted nested CASE expressions. (CVE-2016-5423)
- A flaw exists that is triggered during the handling of database and role names with embedded special characters. An unauthenticated, remote attacker can exploit this to execute arbitrary code during administrative operations such as pg_dumpall. (CVE-2016-5424)
- A denial of service vulnerability exists in the pg_get_expr() function that is triggered during the handling of inconsistent values. An authenticated, remote attacker can exploit this to crash the database.
- An overflow condition exists in the to_number() function due to improper validation of user-supplied input. An authenticated, remote attacker can exploit this to cause a denial of service condition.
* Note: This check solely relied on the version number of the remote PostgreSQL server to assess this vulnerability, so this might be a false positive.
* References: http://www.postgresql.org/about/news/1688/ http://www.postgresql.org/docs/current/static/release-9-5-4.html
* Platforms Affected: PostgreSQL prior to 9.5.4 Any operating system Any version |
Recommendation |
Upgrade to the latest version of PostgreSQL (9.5.4 or later), available from the PostgreSQL Web page at http://www.postgresql.org/download/ |
Related URL |
CVE-2016-5423,CVE-2016-5424 (CVE) |
Related URL |
92433,92435 (SecurityFocus) |
Related URL |
(ISS) |
|