[arch-security] [ASA-201709-2] postgresql: multiple issues

Levente Polyak anthraxx at archlinux.org
Wed Sep 6 20:37:40 UTC 2017


Arch Linux Security Advisory ASA-201709-2
=========================================

Severity: High
Date    : 2017-09-06
CVE-ID  : CVE-2017-7546 CVE-2017-7547 CVE-2017-7548
Package : postgresql
Type    : multiple issues
Remote  : Yes
Link    : https://security.archlinux.org/AVG-381

Summary
=======

The package postgresql before version 9.6.4-1 is vulnerable to multiple
issues including information disclosure, access restriction bypass and
authentication bypass.

Resolution
==========

Upgrade to 9.6.4-1.

# pacman -Syu "postgresql>=9.6.4-1"

The problems have been fixed upstream in version 9.6.4.

Workaround
==========

None.

Description
===========

- CVE-2017-7546 (authentication bypass)

It was found that authenticating to a PostgreSQL database account with
an empty password was possible despite libpq's refusal to send an empty
password. A remote attacker could potentially use this flaw to gain
access to database accounts with empty passwords.

- CVE-2017-7547 (information disclosure)

An authorization flaw was found in the way PostgreSQL handled access to
the pg_user_mappings view on foreign servers. A remote authenticated
attacker could potentially use this flaw to retrieve passwords from the
user mappings defined by the foreign server owners without actually
having the privileges to do so.

- CVE-2017-7548 (access restriction bypass)

An authorization flaw was found in the way PostgreSQL handled large
objects. A remote authenticated attacker with no privileges on a large
object could potentially use this flaw to overwrite the entire content
of the object, thus resulting in denial of service.

Impact
======

A remote unauthenticated attacker is be able to gain access to database
accounts with empty passwords. Additionally a remote authenticated user
may be able to perform a denial of service attack or retrieve passwords
from the user mappings.

References
==========

https://www.postgresql.org/about/news/1772/
https://github.com/postgres/postgres/commit/d5d46d99ba47f
https://github.com/postgres/postgres/commit/b6e39ca92eeee4
https://github.com/postgres/postgres/commit/f1cda6d6cbb2
https://security.archlinux.org/CVE-2017-7546
https://security.archlinux.org/CVE-2017-7547
https://security.archlinux.org/CVE-2017-7548

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20170906/9fa9c814/attachment.asc>


More information about the arch-security mailing list