The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


Immunix Secured OS 7+ PostgreSQL update


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: 10 Apr 2003 00:15:30 -0700
From: WireX Security Team <[email protected]>
To: [email protected], [email protected],
Subject: Immunix Secured OS 7+ PostgreSQL update

--=-5YtyeoyeRVuxKd02afnJ
Content-Type: text/plain
Content-Transfer-Encoding: quoted-printable

----------------------------------------------------------------------
	Immunix Secured OS Security Advisory

Packages updated:	postgresql
Affected products:	Immunix 7.0, 7+
Bugs fixed:		CAN-2002-0972
			CAN-2002-1397
			CAN-2002-1398
			CAN-2002-1400
			CAN-2002-1401
			CAN-2002-1402
Date:			Tue Apr  8 2003
Advisory ID:		IMNX-2003-7+-005-01
Author:			Alan Olsen <[email protected]>
-----------------------------------------------------------------------

Description:
  Multiple vulnerabilities have been discovered in PostgreSQL.

  CAN-2002-0972
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCAN-2002-0972
  Buffer overflows in PostgreSQL 7.2 allow attackers to cause a denial of=20
  service and possibly execute arbitrary code via long arguments to the=20
  functions (1) lpad or (2) rpad.

  CAN-2002-1397
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCAN-2002-1397
  Vulnerability in the cash_words() function for PostgreSQL 7.2 and earlier=
=20
  allows local users to cause a denial of service and possibly execute=20
  arbitrary code via a large negative argument, possibly triggering an=20
  integer signedness error or buffer overflow.

  CAN-2002-1398
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCAN-2002-1398
  Buffer overflow in the date parser for PostgreSQL before 7.2.2 allows=20
  attackers to cause a denial of service and possibly execute arbitrary cod=
e=20
  via a long date string, aka a vulnerability "in handling long datetime=20
  input."

  CAN-2002-1400
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCAN-2002-1400
  Heap-based buffer overflow in the repeat() function for PostgreSQL before=
=20
  7.2.2 allows attackers to execute arbitrary code by causing repeat() to=20
  generate a large string.

  CAN-2002-1401
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCAN-2002-1401
  Buffer overflows in (1) circle_poly, (2) path_encode and (3) path_add=20
  (also incorrectly identified as path_addr) for PostgreSQL 7.2.3 and=20
  earlier allow attackers to cause a denial of service and possibly execute=
=20
  arbitrary code, possibly as a result of an integer overflow.

  CAN-2002-1402
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCAN-2002-1402
  Buffer overflows in the (1) TZ and (2) SET TIME ZONE enivronment variable=
s=20
  for PostgreSQL 7.2.1 and earlier allow local users to cause a denial of=20
  service and possibly execute arbitrary code.

Package names and locations:
  Precompiled binary packages for Immunix 7+ are available at:

  http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/postgresql-7.0.2-18=
.2_imnx_1.i386.rpm
  http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/postgresql-devel-7.=
0.2-18.2_imnx_1.i386.rpm
  http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/postgresql-jdbc-7.0=
.2-18.2_imnx_1.i386.rpm
  http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/postgresql-odbc-7.0=
.2-18.2_imnx_1.i386.rpm
  http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/postgresql-perl-7.0=
.2-18.2_imnx_1.i386.rpm
  http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/postgresql-python-7=
.0.2-18.2_imnx_1.i386.rpm
  http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/postgresql-server-7=
.0.2-18.2_imnx_1.i386.rpm
  http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/postgresql-tcl-7.0.=
2-18.2_imnx_1.i386.rpm
  http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/postgresql-tk-7.0.2=
-18.2_imnx_1.i386.rpm =20

Immunix OS 7+ md5sums:

  93baa0d9c42efabf50eacc52b4842977  postgresql-7.0.2-18.2_imnx_1.i386.rpm
  f3932ce27a695a5e5568b927994dc8be  postgresql-devel-7.0.2-18.2_imnx_1.i386=
.rpm
  1c21fa51b3e24242bc5c9651fb8e1805  postgresql-jdbc-7.0.2-18.2_imnx_1.i386.=
rpm
  8cc120126c031b47068ae2d6d673976c  postgresql-odbc-7.0.2-18.2_imnx_1.i386.=
rpm
  6e12763d405762a6874f0ff2f2a03154  postgresql-perl-7.0.2-18.2_imnx_1.i386.=
rpm
  a8504feff58d0c0adb771e5cce733302  postgresql-python-7.0.2-18.2_imnx_1.i38=
6.rpm
  ecd038e70c31a72bbfd682d6ae172a01  postgresql-server-7.0.2-18.2_imnx_1.i38=
6.rpm
  600f102d0bd36e876b05e65e2b2398e8  postgresql-tcl-7.0.2-18.2_imnx_1.i386.r=
pm
  f59244858a7992beead0ce789985a0f7  postgresql-tk-7.0.2-18.2_imnx_1.i386.rp=
m

GPG verification:                                                          =
    =20
  Our public key is available at <http://wirex.com/security/GPG_KEY>;.      =
    =20

NOTE:
  Ibiblio is graciously mirroring our updates, so if the links above are
  slow, please try:
    ftp://ftp.ibiblio.org/pub/Linux/distributions/immunix/
  or one of the many mirrors available at:
    http://www.ibiblio.org/pub/Linux/MIRRORS.html

  ImmunixOS 6.2 is no longer officially supported.
  ImmunixOS 7.0 is no longer officially supported.

Contact information:
  To report vulnerabilities, please contact [email protected]. WireX=20
  attempts to conform to the RFP vulnerability disclosure protocol
  <http://www.wiretrip.net/rfp/policy.html>;.




--=-5YtyeoyeRVuxKd02afnJ
Content-Type: application/pgp-signature; name=signature.asc
Content-Description: This is a digitally signed message part

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQA+lRoSVQcWL60UVMsRAj/+AJ4rAefp4pR388NSCfqgiKrFR/htQwCeNFHH
a/hPRwEIjjRor3c8lMhnss4=
=EZbC
-----END PGP SIGNATURE-----

--=-5YtyeoyeRVuxKd02afnJ--

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру