SB2019080820 - Multiple vulnerabilities in PostgreSQL 



SB2019080820 - Multiple vulnerabilities in PostgreSQL

Published: August 8, 2019

Security Bulletin ID SB2019080820
Severity
Low
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2019-10208)

The vulnerability allows a remote attacker to escalate privileges on the system.

The vulnerability exists due to way PostreSQL processes SECURITY DEFINER functions. A privileged attacker with EXECUTE permission, which must itself contain a function call having inexact argument type match, can execute arbitrary SQL query under the identity of the function owner.


2) Information disclosure (CVE-ID: CVE-2019-10209)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to way PostgreSQL processes user-defined hash equality operators. A remote attacker can under certain circumstances read arbitrary bytes from server memory.

Note, exploitation of this vulnerability requires a superuser to create unusual operators.


3) Unprotected storage of credentials (CVE-ID: CVE-2019-10210)

The vulnerability allows a local user to access credentials in plain text.
The vulnerability exists due to EnterpriseDB Windows installer writes a password to a temporary file in its installation directory, creates initial databases, and deletes the file. During those seconds while the file exists, a local user can read the PostgreSQL superuser password from the file.

4) Untrusted search path (CVE-ID: CVE-2019-10211)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to EnterpriseDB Windows installer bundles an OpenSSL library that tries to load configuration from a hard-coded location on the system. This location usually does not exists, therefore an attacker can create a folder, place malicious configuration file in it and execute the configuration.


Remediation

Install update from vendor's website.