RULE(RULE ID:711239)

Rule General Information
Release Date: 2018-11-20
Rule Name: DB-OTHER PostgreSQL Database Core Server non-libpq Client Policy Bypass Vulnerability (CVE-2017-7546)
Severity:
CVE ID:
Rule Protection Details
Description: A security policy bypass vulnerability has been reported in the core server component of the PostgreSQL database server. The vulnerability is due to improper authentication of user accounts with empty passwords for clients that do not use libpq. Versions prior to PostgreSQL 9.2.22, 9.3.18, 9.4.13, 9.5.8, and 9.6.4 are vulnerable.
Impact: An attacker can take advantage of the vulnerability to bypass the security policy implemented by the software administrator, and perform unauthorized actions to the target system.
Affected OS: Solaris, FreeBSD, Windows, Linux, Other Unix, Others
Reference: http://www.debian.org/security/2017/dsa-3935
http://www.debian.org/security/2017/dsa-3936
SecurityFocusBID:100278
SecurityTrackerID:1039142
https://access.redhat.com/errata/RHSA-2017:2677
https://access.redhat.com/errata/RHSA-2017:2678
https://access.redhat.com/errata/RHSA-2017:2728
https://access.redhat.com/errata/RHSA-2017:2860
https://security.gentoo.org/glsa/201710-06
https://www.postgresql.org/about/news/1772/
Solutions
Please replace the product with an unaffected version. Upgrading to version 9.2.22, 9.3.18, 9.4.13, 9.5.8 or 9.6.4 eliminates this vulnerability.