Описание
A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq was used with "host" or "hostaddr" connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction. Postgresql versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 are affected.
A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq were used with "host" or "hostaddr" connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction.
Отчет
This vulnerability is only exploitable where an attacker can provide or influence connection parameters to a PostgreSQL client application using libpq. Contrib modules "dblink" and "postgres_fdw" are examples of applications affected by this flaw. Red Hat Virtualization includes vulnerable versions of postgresql. However this flaw is not known to be exploitable under any supported configuration of Red Hat Virtualization. A future update may address this issue. This issue affects the versions of the rh-postgresql95-postgresql package as shipped with Red Hat Satellite 5.7 and 5.8. However, this flaw is not known to be exploitable under any supported scenario in Satellite 5. A future update may address this issue.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
CloudForms Management Engine 5 | postgresql94 | Affected | ||
Red Hat Ansible Tower 3 | postgresql96 | Affected | ||
Red Hat Enterprise Linux 5 | postgresql | Not affected | ||
Red Hat Enterprise Linux 5 | postgresql84 | Not affected | ||
Red Hat Enterprise Linux 6 | postgresql | Not affected | ||
Red Hat Enterprise Linux 8 | libpq | Not affected | ||
Red Hat Enterprise Linux 8 | postgresql | Not affected | ||
Red Hat Mobile Application Platform 4 | millicore | Not affected | ||
Red Hat Satellite 5 | rh-postgresql95-postgresql | Will not fix | ||
CloudForms Management Engine 5.9 | cfme | Fixed | RHSA-2018:3816 | 13.12.2018 |
Показывать по
Дополнительная информация
Статус:
8.5 High
CVSS3
Связанные уязвимости
A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq was used with "host" or "hostaddr" connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction. Postgresql versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 are affected.
A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq was used with "host" or "hostaddr" connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction. Postgresql versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 are affected.
A vulnerability was found in libpq, the default PostgreSQL client libr ...
8.5 High
CVSS3