📄 deb_165_1.nasl
字号:
# OpenVAS Vulnerability Test# $Id$# Description: Auto-generated from advisory DSA 165-1## Authors:# Thomas Reinke <reinke@securityspace.com>## Copyright:# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com# Text descriptions are largerly excerpted from the referenced# advisory, and are Copyright (c) the respective author(s)## This program is free software; you can redistribute it and/or modify# it under the terms of the GNU General Public License version 2,# as published by the Free Software Foundation## This program is distributed in the hope that it will be useful,# but WITHOUT ANY WARRANTY; without even the implied warranty of# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the# GNU General Public License for more details.## You should have received a copy of the GNU General Public License# along with this program; if not, write to the Free Software# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.#if(description){ script_id(53421); script_cve_id("CVE-2002-0972"); script_version ("$"); name["english"] = "Debian Security Advisory DSA 165-1 (postgresql)"; script_name(english:name["english"]); desc["english"] = "The remote host is missing an update to postgresqlannounced via advisory DSA 165-1.Mordred Labs and others found several vulnerabilities in PostgreSQL,an object-relational SQL database. They are inherited from severalbuffer overflows and integer overflows. Specially crafted long dateand time input, currency, repeat data and long timezone names couldcause the PostgreSQL server to crash as well as specially craftedinput data for lpad() and rpad(). More buffer/integer overflows werefound in circle_poly(), path_encode() and path_addr().Except for the last three, these problems are fixed in the upstreamrelease 7.2.2 of PostgreSQL which is the recommended version to use.Most of these problems do not exist in the version of PostgreSQL thatDebian ships in the potato release since the correspondingfunctionality is not yet implemented. However, PostgreSQL 6.5.3 isquite old and may bear more risks than we are aware of, which mayinclude further buffer overflows, and certainly include bugs thatthreaten the integrity of your data.You are strongly advised not to use this release but to upgrade yoursystem to Debian 3.0 (stable) including PostgreSQL release 7.2.1instead, where many bugs have been fixed and new features introducedto increase compatibility with the SQL standards.If you consider an upgrade, please make sure to dump the entiredatabase system using the pg_dumpall utility. Please take intoconsideration that the newer PostgreSQL is more strict in its inputhandling. This means that tests line foo = NULL which are not validwon't be accepted anymore. It also means that when using UNICODEencoding, ISO 8859-1 and ISO 8859-15 are no longer valid incoding touse when inserting data into the relation. In such a case you areadvised to convert the dump in question using recode latin1..utf-16.These problems have been fixed in version 7.2.1-2woody2 for thecurrent stable distribution (woody) and in version 7.2.2-2 for theunstable distribution (sid). The old stable distribution (potato) ispartially affected and we ship a fixed version 6.5.3-27.2 for it.We recommend that you upgrade your PostgreSQL packages.Solution:https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20165-1Risk factor : High"; script_description(english:desc["english"]); summary["english"] = "Debian Security Advisory DSA 165-1 (postgresql)"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english:"Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com"); family["english"] = "Debian Local Security Checks"; script_family(english:family["english"]); script_dependencies("gather-package-list.nasl"); script_require_keys("ssh/login/packages"); exit(0);}## The script code starts here#include("revisions-lib.inc");include("pkg-lib-deb.inc");vuln = 0;if(isdpkgvuln(pkg:"postgresql-doc", ver:"6.5.3-27.2", rls:"DEB2.2")) { vuln = 1;}if(isdpkgvuln(pkg:"postgresql", ver:"6.5.3-27.2", rls:"DEB2.2")) { vuln = 1;}if(isdpkgvuln(pkg:"postgresql-client", ver:"6.5.3-27.2", rls:"DEB2.2")) { vuln = 1;}if(isdpkgvuln(pkg:"postgresql-contrib", ver:"6.5.3-27.2", rls:"DEB2.2")) { vuln = 1;}if(isdpkgvuln(pkg:"postgresql-dev", ver:"6.5.3-27.2", rls:"DEB2.2")) { vuln = 1;}if(isdpkgvuln(pkg:"postgresql-doc", ver:"7.2.1-2woody2", rls:"DEB3.0")) { vuln = 1;}if(isdpkgvuln(pkg:"postgresql", ver:"7.2.1-2woody2", rls:"DEB3.0")) { vuln = 1;}if(isdpkgvuln(pkg:"postgresql-client", ver:"7.2.1-2woody2", rls:"DEB3.0")) { vuln = 1;}if(isdpkgvuln(pkg:"postgresql-contrib", ver:"7.2.1-2woody2", rls:"DEB3.0")) { vuln = 1;}if(isdpkgvuln(pkg:"postgresql-dev", ver:"7.2.1-2woody2", rls:"DEB3.0")) { vuln = 1;}if(vuln) { security_hole(0);}
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -