|
|||
Rule General Information |
---|
Release Date: | 2020-05-15 | |
Rule Name: | PostgreSQL SCRAM-SHA-256 Stack Buffer Overflow Vulnerability (CVE-2019-10164) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | PostgreSQL versions 10.x before 10.9 and versions 11.x before 11.4 are vulnerable to a stack-based buffer overflow. Any authenticated user can overflow a stack-based buffer by changing the user's own password to a purpose-crafted value. This often suffices to execute arbitrary code as the PostgreSQL operating system account. | |
Impact: | A buffer overflow vulnerability can be triggered by an attacker in the context of the vulnerable product. Further attacks includes arbitrary code execution and denial of service. | |
Affected OS: | Windows, Linux, Mac OS | |
Reference: | http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00035.html https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10164 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MAGE6H4FWLKFLHLWVYNPYGQRPIXTUWGB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TTKEHXGDXYYD6WYDIIQJP4GDQJSENDJK/ |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: https://www.postgresql.org/about/news/1949/ |