RULE(RULE ID:713936)

Rule General Information
Release Date: 2020-05-15
Rule Name: PostgreSQL SCRAM-SHA-256 Stack Buffer Overflow Vulnerability (CVE-2019-10164)
Severity:
CVE ID:
Rule Protection Details
Description: PostgreSQL versions 10.x before 10.9 and versions 11.x before 11.4 are vulnerable to a stack-based buffer overflow. Any authenticated user can overflow a stack-based buffer by changing the user's own password to a purpose-crafted value. This often suffices to execute arbitrary code as the PostgreSQL operating system account.
Impact: A buffer overflow vulnerability can be triggered by an attacker in the context of the vulnerable product. Further attacks includes arbitrary code execution and denial of service.
Affected OS: Windows, Linux, Mac OS
Reference: http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00035.html
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10164
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MAGE6H4FWLKFLHLWVYNPYGQRPIXTUWGB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TTKEHXGDXYYD6WYDIIQJP4GDQJSENDJK/
Solutions
The vendors have released upgrade patches to fix vulnerabilities, please visit:
https://www.postgresql.org/about/news/1949/