VID |
25381 |
Severity |
40 |
Port |
5432 |
Protocol |
TCP |
Class |
DB |
Detailed Description |
The version of PostgreSQL installed on the remote host is 10 prior to 10.21, 11 prior to 11.16, 12 prior to 12.11, 13 prior to 13.7, or 14 prior to 14.3. As such, it is potentially affected by a privilege escalation vulnerability:
- Autovacuum, REINDEX, CREATE INDEX, REFRESH MATERIALIZED VIEW, CLUSTER, and pg_amcheck made incomplete efforts to operate safely when a privileged user is maintaining another user's objects. Those commands activated relevant protections too late or not at all. An attacker having permission to create non-temp objects in at least one schema could execute arbitrary SQL functions under a superuser identity. (CVE-2022-1552)
* References: https://www.postgresql.org/support/security/CVE-2022-1552/
* Platforms Affected: PostgreSQL prior to 14.3 Any operating system Any version |
Recommendation |
Upgrade to the latest version of PostgreSQL (14.3 or later), available from the PostgreSQL Web page at http://www.postgresql.org/download/ |
Related URL |
CVE-2022-1552 (CVE) |
Related URL |
103221 (SecurityFocus) |
Related URL |
(ISS) |
|