|Summary:||CVE-2013-1899 postgresql: Insecure switch parsing|
|Product:||[Other] Security Response||Reporter:||Jan Lieskovsky <jlieskov>|
|Component:||vulnerability||Assignee:||Red Hat Product Security <security-response-team>|
|Status:||CLOSED ERRATA||QA Contact:|
|Version:||unspecified||CC:||jfrey, jrafanie, security-response-team, tgl|
|Target Milestone:||---||Keywords:||Reopened, Security|
|Fixed In Version:||PostgreSQL 9.0.13, PostgreSQL 9.1.9, PostgreSQL 9.2.4||Doc Type:||Bug Fix|
|Doc Text:||Story Points:||---|
|Last Closed:||2013-10-08 19:26:55 UTC||Type:||---|
|oVirt Team:||---||RHEL 7.3 requirements from Atomic Host:|
|Bug Depends On:||947202, 948308, 948312|
Description Jan Lieskovsky 2013-03-29 14:48:40 UTC
A denial of service flaw was found in the way command switch parsing logic of PostgreSQL, an advanced Object-Relational database management system, processed certain database names (a database name beginning with '-' character was interpreted as it if were a command line switch for a standalone backend). A remote attacker could issue a specially-crafted SQL query that, when processed by the PostgreSQL server would lead to unauthorized modification of the server's configuration file or attacker's ability to replace server's critical database / table with a junk file (of their choose), during the server's crash recovery process (denial of service).
Comment 2 Jan Lieskovsky 2013-03-29 14:58:01 UTC
This issue does NOT affect the version of the postgresql package, as shipped with Red Hat Enterprise Linux 5. -- This issue does NOT affect the version of the postgresql84 package, as shipped with Red Hat Enterprise Linux 5. -- This issue does NOT affect the version of the postgresql package, as shipped with Red Hat Enterprise Linux 6. -- This issue affects the versions of the postgresql package, as shipped with Fedora release of 17 and 18.
Comment 3 Jan Lieskovsky 2013-03-29 15:02:13 UTC
Acknowledgements: Red Hat would like to thank the PostgreSQL project for reporting this issue. Upstream acknowledges Mitsumasa Kondo and Kyotaro Horiguchi as the original issue reporters.
Comment 6 Huzaifa S. Sidhpurwala 2013-04-01 06:51:38 UTC
Statement: Not Vulnerable. This issue does not affect the version of postgresql as shipped with Red Hat Enterprise Linux 5 and 6. This issue does not affect the version of postgresql84 as shipped with Red Hat Enterprise Linux 5.
Comment 16 Vincent Danen 2013-04-04 14:42:10 UTC
Created postgresql tracking bugs for this issue Affects: fedora-all [bug 948312]
Comment 17 Tomas Hoger 2013-04-04 14:56:02 UTC
Upstream announcement: http://www.postgresql.org/about/news/1456/
Comment 18 Fedora Update System 2013-04-05 22:59:19 UTC
postgresql-9.2.4-1.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report.
Comment 19 Fedora Update System 2013-04-05 23:11:31 UTC
postgresql-9.1.9-1.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report.
Comment 20 Tomas Hoger 2013-04-07 19:53:01 UTC
Upstream FAQ for this issue: http://www.postgresql.org/support/security/faq/2013-04-04/
Comment 21 Tomas Hoger 2013-04-09 08:15:39 UTC
Comment 22 Tomas Hoger 2013-04-10 05:55:51 UTC
LWN article related to this issue, from Josh Berkus is of the PostgreSQL Core Team: https://lwn.net/Articles/546550/
Comment 23 Tomas Hoger 2013-04-10 05:57:09 UTC
Metasploit scanner to identify vulnerable PostgreSQL versions: http://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/scanner/postgres/postgres_dbname_flag_injection.rb
Comment 24 Jan Lieskovsky 2013-04-11 06:54:30 UTC
Third party analysis of the issue (and possible consequences): http://blog.blackwinghq.com/2013/04/08/2/
Comment 25 Fedora Update System 2013-04-20 19:59:22 UTC
postgresql-9.2.4-1.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.