SB2016110831 - Multiple vulnerabilities in PostgreSQL
Published: November 8, 2016 Updated: June 23, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Improper access control (CVE-ID: CVE-2016-8606)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
The REPL server (--listen) in GNU Guile 2.0.12 allows an attacker to execute arbitrary code via an HTTP inter-protocol attack.
2) SQL injection (CVE-ID: CVE-2006-2314)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
PostgreSQL 8.1.x before 8.1.4, 8.0.x before 8.0.8, 7.4.x before 7.4.13, 7.3.x before 7.3.15, and earlier versions allows context-dependent attackers to bypass SQL injection protection methods in applications that use multibyte encodings that allow the '' (backslash) byte 0x5c to be the trailing byte of a multibyte character, such as SJIS, BIG5, GBK, GB18030, and UHC, which cannot be handled correctly by a client that does not understand multibyte encodings, aka a second variant of 'Encoding-Based SQL Injection.' NOTE: it could be argued that this is a class of issue related to interaction errors between the client and PostgreSQL, but a CVE has been assigned since PostgreSQL is treating this as a preventative measure against this class of problem.
3) SQL injection (CVE-ID: CVE-2006-2313)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
PostgreSQL 8.1.x before 8.1.4, 8.0.x before 8.0.8, 7.4.x before 7.4.13, 7.3.x before 7.3.15, and earlier versions allows context-dependent attackers to bypass SQL injection protection methods in applications via invalid encodings of multibyte characters, aka 1 variant of 'Encoding-Based SQL Injection.'
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=df3387f68c125222d51e5ba0de08b2065585c155
- https://git.alpinelinux.org/aports/commit/?id=6c9dd3be0e2be5db55ba41079e715b8c79b86678
- ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc
- http://archives.postgresql.org/pgsql-announce/2006-05/msg00010.php
- http://lists.suse.com/archive/suse-security-announce/2006-Jun/0002.html
- http://secunia.com/advisories/20231
- http://secunia.com/advisories/20232
- http://secunia.com/advisories/20314
- http://secunia.com/advisories/20435
- http://secunia.com/advisories/20451
- http://secunia.com/advisories/20503
- http://secunia.com/advisories/20555
- http://secunia.com/advisories/20653
- http://secunia.com/advisories/20782
- http://secunia.com/advisories/21001
- http://secunia.com/advisories/21749
- http://security.gentoo.org/glsa/glsa-200607-04.xml
- http://securitytracker.com/id?1016142
- http://support.avaya.com/elmodocs2/security/ASA-2006-113.htm
- http://www.debian.org/security/2006/dsa-1087
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:098
- http://www.novell.com/linux/security/advisories/2006_21_sr.html
- http://www.osvdb.org/25731
- http://www.postgresql.org/docs/techdocs.50
- http://www.redhat.com/support/errata/RHSA-2006-0526.html
- http://www.securityfocus.com/archive/1/435038/100/0/threaded
- http://www.securityfocus.com/archive/1/435161/100/0/threaded
- http://www.securityfocus.com/bid/18092
- http://www.trustix.org/errata/2006/0032/
- http://www.ubuntu.com/usn/usn-288-2
- http://www.ubuntu.com/usn/usn-288-3
- http://www.vupen.com/english/advisories/2006/1941
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26627
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26628
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9947
- https://usn.ubuntu.com/288-1/
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10618