fkie_cve-2013-1901
Vulnerability from fkie_nvd
Published
2013-04-04 17:55
Modified
2024-11-21 01:50
Severity ?
Summary
PostgreSQL 9.2.x before 9.2.4 and 9.1.x before 9.1.9 does not properly check REPLICATION privileges, which allows remote authenticated users to bypass intended backup restrictions by calling the (1) pg_start_backup or (2) pg_stop_backup functions.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
postgresql | postgresql | 9.2 | |
postgresql | postgresql | 9.2.1 | |
postgresql | postgresql | 9.2.2 | |
postgresql | postgresql | 9.2.3 | |
postgresql | postgresql | 9.1 | |
postgresql | postgresql | 9.1.1 | |
postgresql | postgresql | 9.1.2 | |
postgresql | postgresql | 9.1.3 | |
postgresql | postgresql | 9.1.4 | |
postgresql | postgresql | 9.1.5 | |
postgresql | postgresql | 9.1.6 | |
postgresql | postgresql | 9.1.7 | |
postgresql | postgresql | 9.1.8 | |
canonical | ubuntu_linux | 8.04 | |
canonical | ubuntu_linux | 10.04 | |
canonical | ubuntu_linux | 11.10 | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 12.10 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "AD27648F-E2FF-4779-97F9-2632DCC6B16D", "vulnerable": true }, { "criteria": "cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "CEFB4916-8B59-4534-804C-CF9DA1B18508", "vulnerable": true }, { "criteria": "cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "3413A3AB-45A3-48E1-9B30-1194C4E7D49D", "vulnerable": true }, { "criteria": "cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "5760CE83-4802-42A0-9338-E1E634882450", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "4796DBEC-FF4F-4749-90D5-AD83D8B5E086", "vulnerable": true }, { "criteria": "cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "79108278-D644-4506-BD9C-F464C6E817B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "10CF0AA0-41CD-4D50-BA7A-BF8846115C95", "vulnerable": true }, { "criteria": "cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "965E1A9D-BB23-4C0B-A9CA-54A1855055B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "A1F37C66-0AFE-4D59-8867-BDBCE656774E", "vulnerable": true }, { "criteria": "cpe:2.3:a:postgresql:postgresql:9.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "5CE53AE6-232C-4068-98D1-7749007C3CFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:postgresql:postgresql:9.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "FFD38139-FD17-41E7-8D10-7731D8203CFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:postgresql:postgresql:9.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "CCC0B41F-38FF-4D41-9E31-D666A84BB2FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:postgresql:postgresql:9.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "A591CB08-5CEB-45EB-876F-417DCD60AF53", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*", "matchCriteriaId": "D6DFE2D3-46E2-4D0C-8508-30307D654560", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "matchCriteriaId": "7118F616-25CA-4E34-AA13-4D14BB62419F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "matchCriteriaId": "E4174F4F-149E-41A6-BBCC-D01114C05F38", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "matchCriteriaId": "F5D324C4-97C7-49D3-A809-9EAD4B690C69", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "PostgreSQL 9.2.x before 9.2.4 and 9.1.x before 9.1.9 does not properly check REPLICATION privileges, which allows remote authenticated users to bypass intended backup restrictions by calling the (1) pg_start_backup or (2) pg_stop_backup functions." }, { "lang": "es", "value": "PostgreSQL v9.2.x anterior a v9.2.4, v9.1.x anterior a v9.1.9 no comprueba correctamente los privilegios de \"REPLICATION\", lo que permite a usuarios remotos autenticados para eludir restricciones de seguridad destinados a la llamada (1) pg_start_backup o las funciones (2) pg_stop_backup." } ], "evaluatorImpact": "Per http://www.ubuntu.com/usn/USN-1789-1/\r\n\"A security issue affects these releases of Ubuntu and its derivatives:\r\n\r\nUbuntu 12.10\r\nUbuntu 12.04 LTS\r\nUbuntu 11.10\r\nUbuntu 10.04 LTS\r\nUbuntu 8.04 LTS\"", "id": "CVE-2013-1901", "lastModified": "2024-11-21T01:50:37.177", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-04-04T17:55:00.923", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html" }, { "source": "secalert@redhat.com", "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101519.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102806.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00007.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00008.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00011.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00012.html" }, { "source": "secalert@redhat.com", "url": "http://support.apple.com/kb/HT5880" }, { "source": "secalert@redhat.com", "url": "http://support.apple.com/kb/HT5892" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2013/dsa-2658" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:142" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.postgresql.org/about/news/1456/" }, { "source": "secalert@redhat.com", "url": "http://www.postgresql.org/docs/current/static/release-9-1-9.html" }, { "source": "secalert@redhat.com", "url": "http://www.postgresql.org/docs/current/static/release-9-2-4.html" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1789-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101519.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102806.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00011.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00012.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT5880" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT5892" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2013/dsa-2658" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:142" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.postgresql.org/about/news/1456/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.postgresql.org/docs/current/static/release-9-1-9.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.postgresql.org/docs/current/static/release-9-2-4.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1789-1" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.