📄 deb_1463_1.nasl
字号:
# OpenVAS Vulnerability Test# $Id$# Description: Auto-generated from advisory DSA 1463-1 (postgresql-7.4)## Authors:# Thomas Reinke <reinke@securityspace.com>## Copyright:# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com# Text descriptions are largerly excerpted from the referenced# advisory, and are Copyright (c) the respective author(s)## This program is free software; you can redistribute it and/or modify# it under the terms of the GNU General Public License version 2,# as published by the Free Software Foundation## This program is distributed in the hope that it will be useful,# but WITHOUT ANY WARRANTY; without even the implied warranty of# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the# GNU General Public License for more details.## You should have received a copy of the GNU General Public License# along with this program; if not, write to the Free Software# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.#if(description){ script_id(60180); script_cve_id("CVE-2007-3278", "CVE-2007-4769", "CVE-2007-4772", "CVE-2007-6067", "CVE-2007-6600", "CVE-2007-6601"); script_version ("$"); name["english"] = "Debian Security Advisory DSA 1463-1 (postgresql-7.4)"; script_name(english:name["english"]); desc["english"] = "The remote host is missing an update to postgresql-7.4announced via advisory DSA 1463-1.Several local vulnerabilities have been discovered in PostgreSQL, anobject-relational SQL database. The Common Vulnerabilities and Exposuresproject identifies the following problems:CVE-2007-3278It was discovered that the DBLink module performed insufficientcredential validation. This issue is also tracked as CVE-2007-6601,since the initial upstream fix was incomplete.CVE-2007-4769Tavis Ormandy and Will Drewry discovered that a bug in the handlingof back-references inside the regular expressions engine could leadto an out of bands read, resulting in a crash. This constitutes onlya security problem if an application using ProgreSQL processesregular expressions from untrusted sources.CVE-2007-4772Tavis Ormandy and Will Drewry discovered that the optimizer for regularexpression could be tricked into an infinite loop, resulting in denialof service. This constitutes only a security problem if an applicationusing ProgreSQL processes regular expressions from untrusted sources.CVE-2007-6067Tavis Ormandy and Will Drewry discovered that the optimizer for regularexpression could be tricked massive ressource consumption. Thisconstitutes only a security problem if an application using ProgreSQLprocesses regular expressions from untrusted sources.CVE-2007-6600Functions in index expressions could lead to privilege escalation. Fora more in depth explanation please see the upstream announce availableat http://www.postgresql.org/about/news.905.The unstable distribution (sid) no longer contains postgres-7.4For the stable distribution (etch), these problems have been fixed inversion 7.4.19-0etch1.For the old stable distribution (sarge), some of these problems have beenfixed in version 7.4.7-6sarge6 of the postgresql package. Please note thatthe fix for CVE-2007-6600 and for the handling of regular expressionshasn't been backported due to the intrusiveness of the fix. We recommendto upgrade to the stable distribution if these vulnerabilities affect yoursetup.We recommend that you upgrade your postgresql-7.4 packages.Solution:https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201463-1Risk factor : High"; script_description(english:desc["english"]); summary["english"] = "Debian Security Advisory DSA 1463-1 (postgresql-7.4)"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english:"Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com"); family["english"] = "Debian Local Security Checks"; script_family(english:family["english"]); script_dependencies("gather-package-list.nasl"); script_require_keys("ssh/login/packages"); exit(0);}## The script code starts here#include("revisions-lib.inc");include("pkg-lib-deb.inc");vuln = 0;if(isdpkgvuln(pkg:"postgresql-doc", ver:"7.4.7-6sarge6", rls:"DEB3.1")) { vuln = 1;}if(isdpkgvuln(pkg:"postgresql", ver:"7.4.7-6sarge6", rls:"DEB3.1")) { vuln = 1;}if(isdpkgvuln(pkg:"libpq3", ver:"7.4.7-6sarge6", rls:"DEB3.1")) { vuln = 1;}if(isdpkgvuln(pkg:"libpgtcl-dev", ver:"7.4.7-6sarge6", rls:"DEB3.1")) { vuln = 1;}if(isdpkgvuln(pkg:"postgresql-dev", ver:"7.4.7-6sarge6", rls:"DEB3.1")) { vuln = 1;}if(isdpkgvuln(pkg:"libpgtcl", ver:"7.4.7-6sarge6", rls:"DEB3.1")) { vuln = 1;}if(isdpkgvuln(pkg:"libecpg4", ver:"7.4.7-6sarge6", rls:"DEB3.1")) { vuln = 1;}if(isdpkgvuln(pkg:"postgresql-client", ver:"7.4.7-6sarge6", rls:"DEB3.1")) { vuln = 1;}if(isdpkgvuln(pkg:"postgresql-contrib", ver:"7.4.7-6sarge6", rls:"DEB3.1")) { vuln = 1;}if(isdpkgvuln(pkg:"libecpg-dev", ver:"7.4.7-6sarge6", rls:"DEB3.1")) { vuln = 1;}if(isdpkgvuln(pkg:"postgresql-doc-7.4", ver:"7.4.19-0etch1", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"postgresql-server-dev-7.4", ver:"7.4.19-0etch1", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"postgresql-plpython-7.4", ver:"7.4.19-0etch1", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"postgresql-plperl-7.4", ver:"7.4.19-0etch1", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"postgresql-7.4", ver:"7.4.19-0etch1", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"postgresql-pltcl-7.4", ver:"7.4.19-0etch1", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"postgresql-client-7.4", ver:"7.4.19-0etch1", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"postgresql-contrib-7.4", ver:"7.4.19-0etch1", rls:"DEB4.0")) { vuln = 1;}if(vuln) { security_hole(0);}
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -