Bug 1609891 (CVE-2018-10915) - CVE-2018-10915 postgresql: Certain host connection parameters defeat client-side security defenses
Summary: CVE-2018-10915 postgresql: Certain host connection parameters defeat client-s...
Status: CLOSED ERRATA
Alias: CVE-2018-10915
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=important,public=20180809,repo...
Keywords: Security
Depends On: 1614405 1612665 1612666 1612667 1612668 1612669 1612670 1612671 1612672 1612673 1612674 1612675 1612676 1612683 1612684 1614403 1614404 1614407 1614583 1622771 1622772 1626036 1626037 1626038 1626039 1626040
Blocks: 1609892
TreeView+ depends on / blocked
 
Reported: 2018-07-30 18:12 UTC by Laura Pardo
Modified: 2019-06-11 11:13 UTC (History)
61 users (show)

(edit)
A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq were used with "host" or "hostaddr" connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction.
Clone Of:
(edit)
Last Closed: 2019-06-10 10:34:30 UTC


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2018:2511 None None None 2018-08-20 10:50 UTC
Red Hat Product Errata RHSA-2018:2557 None None None 2018-08-23 15:10 UTC
Red Hat Product Errata RHSA-2018:2565 None None None 2018-08-27 08:21 UTC
Red Hat Product Errata RHSA-2018:2566 None None None 2018-08-27 08:35 UTC
Red Hat Product Errata RHSA-2018:2643 None None None 2018-09-04 13:46 UTC
Red Hat Product Errata RHSA-2018:3816 None None None 2018-12-13 15:15 UTC

Description Laura Pardo 2018-07-30 18:12:44 UTC
A flaw was found in PostgreSQL. The chief PostgreSQL client library, libpq, does not adequately reset its internal state before each connection attempt. When one requests a connection using a "host" or "hostaddr" connection parameter provided by an untrusted party, that party can thwart three security-relevant features of the client. First, they can cause PQconnectionUsedPassword() to erroneously return true. Users of contrib module "dblink" or "postgres_fdw" can leverage that to use server-side login credentials that they should not be able to use. Second, attackers can cause the PQescape*() family of functions to malfunction, permitting SQL injection in "postgres_fdw" and likely in other applications. Third, attackers can cause sslmode=prefer to not attempt SSL/TLS at all

Comment 5 Doran Moppert 2018-08-09 05:51:10 UTC
Acknowledgments:

Name: the PostgreSQL project
Upstream: Andrew Krasichkov

Comment 7 Doran Moppert 2018-08-09 14:23:19 UTC
External References:

https://www.postgresql.org/about/news/1878/

Comment 8 Doran Moppert 2018-08-09 14:24:22 UTC
Created mingw-postgresql tracking bugs for this issue:

Affects: epel-7 [bug 1614405]
Affects: fedora-all [bug 1614407]


Created postgresql tracking bugs for this issue:

Affects: fedora-all [bug 1614404]

Comment 16 errata-xmlrpc 2018-08-20 10:50:37 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 6
  Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS

Via RHSA-2018:2511 https://access.redhat.com/errata/RHSA-2018:2511

Comment 17 errata-xmlrpc 2018-08-23 15:10:26 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:2557 https://access.redhat.com/errata/RHSA-2018:2557

Comment 18 errata-xmlrpc 2018-08-27 08:21:20 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS

Via RHSA-2018:2565 https://access.redhat.com/errata/RHSA-2018:2565

Comment 19 errata-xmlrpc 2018-08-27 08:35:13 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 6
  Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS

Via RHSA-2018:2566 https://access.redhat.com/errata/RHSA-2018:2566

Comment 20 Cedric Buissart 🐶 2018-08-27 09:19:19 UTC
Statement:

This vulnerability is only exploitable where an attacker can provide or influence connection parameters to a PostgreSQL client application using libpq. Contrib modules "dblink" and "postgres_fdw" are examples of applications affected by this flaw.

Red Hat Virtualization includes vulnerable versions of postgresql. However this flaw is not known to be exploitable under any supported configuration of Red Hat Virtualization. A future update may address this issue.

This issue affects the versions of the rh-postgresql95-postgresql package as shipped with Red Hat Satellite 5.7 and 5.8. However, this flaw is not known to be exploitable under any supported scenario in Satellite 5. A future update may address this issue.

Comment 24 errata-xmlrpc 2018-09-04 13:46:28 UTC
This issue has been addressed in the following products:

  Red Hat Virtualization 4 for Red Hat Enterprise Linux 7

Via RHSA-2018:2643 https://access.redhat.com/errata/RHSA-2018:2643

Comment 32 errata-xmlrpc 2018-12-13 15:15:18 UTC
This issue has been addressed in the following products:

  CloudForms Management Engine 5.9

Via RHSA-2018:3816 https://access.redhat.com/errata/RHSA-2018:3816


Note You need to log in before you can comment on or make changes to this bug.