SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Database)  >   PostgreSQL Vendors:   postgresql.org
(Red Hat Issues Fix) PostgreSQL Bugs Let Remote Authenticated Users Deny Service and Gain Elevated Privileges
SecurityTracker Alert ID:  1039081
SecurityTracker URL:  http://securitytracker.com/id/1039081
CVE Reference:   CVE-2016-5423, CVE-2016-5424   (Links to External Site)
Date:  Aug 7 2017
Impact:   Denial of service via network, Disclosure of user information, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Two vulnerabilities were reported in PostgreSQL. A remote authenticated user can cause the target service to crash or gain elevated privileges on the target system.

A remote authenticated user can submit specially crafted SQL statements containing CASE/WHEN commands to cause the target server to crash, disclose portions of server memory, or potentially execute arbitrary code [CVE-2016-5423].

A remote authenticated user with CREATEDB or CREATEROLE roles can create a specially crafted object name containing newlines, carriage returns, double quotes, or backslashes that will, when a superuser runs certain maintenance programs (e.g., pg_dumpall, pg_upgrade, vacuumdb, reindexdb, and clusterdb), grant the user superuser privileges [CVE-2016-5424].

Heikki Linnakangas and Nathan Bossart each reported one vulnerability.

Impact:   A remote authenticated user can cause the target service to crash.

A remote authenticated user with CREATEDB or CREATEROLE roles can obtain elevated privileges on the target system.

Solution:   Red Hat has issued a fix.

The Red Hat advisory is available at:

https://access.redhat.com/errata/RHSA-2017:2425

Vendor URL:  access.redhat.com/errata/RHSA-2017:2425 (Links to External Site)
Cause:   Access control error, Input validation error
Underlying OS:  Linux (Red Hat Enterprise)
Underlying OS Comments:  6

Message History:   This archive entry is a follow-up to the message listed below.
Aug 12 2016 PostgreSQL Bugs Let Remote Authenticated Users Deny Service and Gain Elevated Privileges



 Source Message Contents

Subject:  [RHSA-2017:2425-01] Moderate: rh-postgresql95-postgresql security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: rh-postgresql95-postgresql security update
Advisory ID:       RHSA-2017:2425-01
Product:           Red Hat Satellite
Advisory URL:      https://access.redhat.com/errata/RHSA-2017:2425
Issue date:        2017-08-07
CVE Names:         CVE-2016-5423 CVE-2016-5424 CVE-2017-7484 
                   CVE-2017-7485 CVE-2017-7486 
=====================================================================

1. Summary:

An update for rh-postgresql95-postgresql is now available for Red Hat
Satellite 5.7.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

This update applies only to Satellite 5.7 instances using either embedded
or managed PostgreSQL databases.

There are manual steps required in order to finish the migration from
postgresql92-postgresql to rh-postgresql95-postgresql. If these steps are
not undertaken, the affected Satellite will continue to use PostgreSQL 9.2.

postgresql92-postgresql will be upgraded automatically to
rh-postgresql95-postgresql as part of an upgrade to Satellite 5.8.

2. Relevant releases/architectures:

Red Hat Satellite 5.7 (RHEL v.6) - noarch, s390x, x86_64
Red Hat Satellite Managed DB 5.7 (RHEL v.6) - noarch, s390x, x86_64

3. Description:

PostgreSQL is an advanced object-relational database management system
(DBMS).

The following packages have been upgraded to a later upstream version:
rh-postgresql95-postgresql (9.5.7). (BZ#1449701)

Security Fix(es):

* A flaw was found in the way PostgreSQL server handled certain SQL
statements containing CASE/WHEN commands. A remote, authenticated attacker
could use a specially crafted SQL statement to cause PostgreSQL to crash or
disclose a few bytes of server memory or possibly execute arbitrary code.
(CVE-2016-5423)

* A flaw was found in the way PostgreSQL client programs handled database
and role names containing newlines, carriage returns, double quotes, or
backslashes. By crafting such an object name, roles with the CREATEDB or
CREATEROLE option could escalate their privileges to superuser when a
superuser next executes maintenance with a vulnerable client program.
(CVE-2016-5424)

* It was found that some selectivity estimation functions did not check
user privileges before providing information from pg_statistic, possibly
leaking information. A non-administrative database user could use this flaw
to steal some information from tables they are otherwise not allowed to
access. (CVE-2017-7484)

* It was discovered that the PostgreSQL client library (libpq) did not
enforce the use of TLS/SSL for a connection to a PostgreSQL server when the
PGREQUIRESSL environment variable was set. An man-in-the-middle attacker
could use this flaw to strip the SSL/TLS protection from a connection
between a client and a server. (CVE-2017-7485)

* It was found that the pg_user_mappings view could disclose information
about user mappings to a foreign database to non-administrative database
users. A database user with USAGE privilege for this mapping could, when
querying the view, obtain user mapping data, such as the username and
password used to connect to the foreign database. (CVE-2017-7486)

Red Hat would like to thank the PostgreSQL project for reporting these
issues. Upstream acknowledges Robert Haas as the original reporter of
CVE-2017-7484; Daniel Gustafsson as the original reporter of CVE-2017-7485;
and Andrew Wheelwright as the original reporter of CVE-2017-7486.

4. Solution:

As part of this upgrade, PostgreSQL data files will be moved from
/opt/rh/postgresql92/root/var/lib/pgsql/ to
/var/opt/rh/rh-postgresql95/lib/pgsql/.

Before proceeding with command line portion of the upgrade please insure
that there is enough free space under the /var/opt directory. The amount of
free space required should be at least equal to size of your
/opt/rh/postgresql92/root/var/lib/pgsql/ directory. This size can be
determined using the following command:

du -sh /opt/rh/postgresql92/root/var/lib/pgsql/

After updating packages, run following command on your database machine
(NOTE: in the embedded-database case this is the Satellite system itself;
otherwise, run the command on the system running your PostgreSQL database):

/usr/bin/spacewalk-upgrade-postgresql

postgresql92-postgresql will be upgraded to rh-postgresql95-postgresql.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1364001 - CVE-2016-5423 postgresql: CASE/WHEN with inlining can cause untrusted pointer dereference
1364002 - CVE-2016-5424 postgresql: privilege escalation via crafted database and role names
1434418 - Upgrade PostgreSQL to 9.5
1448078 - CVE-2017-7484 postgresql: Selectivity estimators bypass SELECT privilege checks
1448086 - CVE-2017-7485 postgresql: libpq ignores PGREQUIRESSL environment variable
1448089 - CVE-2017-7486 postgresql: pg_user_mappings view discloses foreign server passwords

6. Package List:

Red Hat Satellite Managed DB 5.7 (RHEL v.6):

Source:
rh-postgresql95-postgresql-9.5.7-2.el6.src.rpm
spacewalk-postgresql-server-9.5-1.el6sat.src.rpm
spacewalk-setup-postgresql-2.3.0-27.el6sat.src.rpm
spacewalk-web-2.3.2-35.el6sat.src.rpm

noarch:
spacewalk-base-minimal-2.3.2-35.el6sat.noarch.rpm
spacewalk-dobby-2.3.2-35.el6sat.noarch.rpm
spacewalk-postgresql-server-9.5-1.el6sat.noarch.rpm
spacewalk-setup-postgresql-2.3.0-27.el6sat.noarch.rpm

s390x:
rh-postgresql95-postgresql-9.5.7-2.el6.s390x.rpm
rh-postgresql95-postgresql-contrib-9.5.7-2.el6.s390x.rpm
rh-postgresql95-postgresql-debuginfo-9.5.7-2.el6.s390x.rpm
rh-postgresql95-postgresql-libs-9.5.7-2.el6.s390x.rpm
rh-postgresql95-postgresql-pltcl-9.5.7-2.el6.s390x.rpm
rh-postgresql95-postgresql-server-9.5.7-2.el6.s390x.rpm
rh-postgresql95-runtime-2.2-3.el6.s390x.rpm

x86_64:
rh-postgresql95-postgresql-9.5.7-2.el6.x86_64.rpm
rh-postgresql95-postgresql-contrib-9.5.7-2.el6.x86_64.rpm
rh-postgresql95-postgresql-debuginfo-9.5.7-2.el6.x86_64.rpm
rh-postgresql95-postgresql-libs-9.5.7-2.el6.x86_64.rpm
rh-postgresql95-postgresql-pltcl-9.5.7-2.el6.x86_64.rpm
rh-postgresql95-postgresql-server-9.5.7-2.el6.x86_64.rpm
rh-postgresql95-runtime-2.2-3.el6.x86_64.rpm

Red Hat Satellite 5.7 (RHEL v.6):

Source:
rh-postgresql95-postgresql-9.5.7-2.el6.src.rpm
spacewalk-backend-2.3.3-53.el6sat.src.rpm
spacewalk-postgresql-server-9.5-1.el6sat.src.rpm
spacewalk-setup-postgresql-2.3.0-27.el6sat.src.rpm
spacewalk-utils-2.3.2-32.el6sat.src.rpm
spacewalk-web-2.3.2-35.el6sat.src.rpm

noarch:
spacewalk-backend-2.3.3-53.el6sat.noarch.rpm
spacewalk-backend-app-2.3.3-53.el6sat.noarch.rpm
spacewalk-backend-applet-2.3.3-53.el6sat.noarch.rpm
spacewalk-backend-config-files-2.3.3-53.el6sat.noarch.rpm
spacewalk-backend-config-files-common-2.3.3-53.el6sat.noarch.rpm
spacewalk-backend-config-files-tool-2.3.3-53.el6sat.noarch.rpm
spacewalk-backend-iss-2.3.3-53.el6sat.noarch.rpm
spacewalk-backend-iss-export-2.3.3-53.el6sat.noarch.rpm
spacewalk-backend-libs-2.3.3-53.el6sat.noarch.rpm
spacewalk-backend-package-push-server-2.3.3-53.el6sat.noarch.rpm
spacewalk-backend-server-2.3.3-53.el6sat.noarch.rpm
spacewalk-backend-sql-2.3.3-53.el6sat.noarch.rpm
spacewalk-backend-sql-oracle-2.3.3-53.el6sat.noarch.rpm
spacewalk-backend-sql-postgresql-2.3.3-53.el6sat.noarch.rpm
spacewalk-backend-tools-2.3.3-53.el6sat.noarch.rpm
spacewalk-backend-xml-export-libs-2.3.3-53.el6sat.noarch.rpm
spacewalk-backend-xmlrpc-2.3.3-53.el6sat.noarch.rpm
spacewalk-base-2.3.2-35.el6sat.noarch.rpm
spacewalk-base-minimal-2.3.2-35.el6sat.noarch.rpm
spacewalk-base-minimal-config-2.3.2-35.el6sat.noarch.rpm
spacewalk-dobby-2.3.2-35.el6sat.noarch.rpm
spacewalk-grail-2.3.2-35.el6sat.noarch.rpm
spacewalk-html-2.3.2-35.el6sat.noarch.rpm
spacewalk-postgresql-server-9.5-1.el6sat.noarch.rpm
spacewalk-pxt-2.3.2-35.el6sat.noarch.rpm
spacewalk-setup-postgresql-2.3.0-27.el6sat.noarch.rpm
spacewalk-sniglets-2.3.2-35.el6sat.noarch.rpm
spacewalk-utils-2.3.2-32.el6sat.noarch.rpm

s390x:
rh-postgresql95-postgresql-9.5.7-2.el6.s390x.rpm
rh-postgresql95-postgresql-contrib-9.5.7-2.el6.s390x.rpm
rh-postgresql95-postgresql-debuginfo-9.5.7-2.el6.s390x.rpm
rh-postgresql95-postgresql-libs-9.5.7-2.el6.s390x.rpm
rh-postgresql95-postgresql-pltcl-9.5.7-2.el6.s390x.rpm
rh-postgresql95-postgresql-server-9.5.7-2.el6.s390x.rpm
rh-postgresql95-runtime-2.2-3.el6.s390x.rpm

x86_64:
rh-postgresql95-postgresql-9.5.7-2.el6.x86_64.rpm
rh-postgresql95-postgresql-contrib-9.5.7-2.el6.x86_64.rpm
rh-postgresql95-postgresql-debuginfo-9.5.7-2.el6.x86_64.rpm
rh-postgresql95-postgresql-libs-9.5.7-2.el6.x86_64.rpm
rh-postgresql95-postgresql-pltcl-9.5.7-2.el6.x86_64.rpm
rh-postgresql95-postgresql-server-9.5.7-2.el6.x86_64.rpm
rh-postgresql95-runtime-2.2-3.el6.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2016-5423
https://access.redhat.com/security/cve/CVE-2016-5424
https://access.redhat.com/security/cve/CVE-2017-7484
https://access.redhat.com/security/cve/CVE-2017-7485
https://access.redhat.com/security/cve/CVE-2017-7486
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2017 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFZiJKFXlSAg2UNWIIRAgghAJ41FncOcjj114YXdBU4384SnIfpXQCghfjP
jfT6QejGNp/PgAj65t6GgIs=
=YaOP
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2017, SecurityGlobal.net LLC