Date: 24 March 2009
References: ESB-2009.0470 ESB-2009.0508 ESB-2009.1378 ESB-2012.0636.2
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
===========================================================================
AA-2009.0061 AUSCERT Advisory
[Win][UNIX/Linux]
New versions of PostgreSQL released
24 March 2009
- ---------------------------------------------------------------------------
AusCERT Advisory Summary
------------------------
Product: PostgreSQL
Operating System: UNIX variants (UNIX, Linux, OSX)
Windows
Impact: Denial of Service
Access: Existing Account
CVE Names: CVE-2009-0922
Member content until: Tuesday, April 21 2009
OVERVIEW:
Updated versions of PostgreSQL have been released correcting a
security vulnerability.
IMPACT:
CVE-2009-0922 has been assigned to this vulnerability which details:
"PostgreSQL 8.3.6 allows remote authenticated users to cause a denial
of service (stack consumption) via mismatched encoding conversion
requests." [1]
This has been confirmed by the vendor in the release notes of the
releases for versions 8.3.7, 8.2.13, 8.1.17, 8.0.21. [2,3,4,5]
Version 7.4.25 has also been released but at the time this bulletin
was published the release notes were not available on the vendor's
site.
MITIGATION:
Users can download the latest version of PostgreSQL from the vendor's
website. [6]
REFERENCES:
[1] Vulnerability Summary for CVE-2009-0922
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-0922
[2] PostgreSQL 8.3.7 Documentation
http://www.postgresql.org/docs/8.3/static/release-8-3-7.html
[3] PostgreSQL 8.2.13 Documentation
http://www.postgresql.org/docs/8.2/static/release-8-2-13.html
[4] PostgreSQL 8.1.17 Documentation
http://www.postgresql.org/docs/8.1/static/release.html#RELEASE-8-1-17
[5] PostgreSQL 8.0.21 Documentation
http://www.postgresql.org/docs/8.0/static/release.html#RELEASE-8-0-21
[6] PostgreSQL: Downloads
http://www.postgresql.org/download/
AusCERT has made every effort to ensure that the information contained
in this document is accurate. However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.
If you believe that your computer system has been compromised or attacked in
any way, we encourage you to let us know by completing the secure National IT
Incident Reporting Form at:
http://www.auscert.org.au/render.html?it=3192
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
iD8DBQFJyHobNVH5XJJInbgRAl4YAJ9f9nQwqWu+yFWLhJH4mZtyNwvdtQCcCXDw
58eZK36VoU3qwbJ67/gdgvo=
=7SYb
-----END PGP SIGNATURE-----
|