[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2012:139 -- Mandriva postgresql

ID: oval:org.secpod.oval:def:302952Date: (C)2012-11-07   (M)2024-02-19
Class: PATCHFamily: unix




Multiple vulnerabilities has been discovered and corrected in postgresql: Prevent access to external files/URLs via contrib/xml2's xslt_process . libxslt offers the ability to read and write both files and URLs through stylesheet commands, thus allowing unprivileged database users to both read and write data with the privileges of the database server. Disable that through proper use of libxslt's security options . Also, remove xslt_process's ability to fetch documents and stylesheets from external files/URLs. While this was a documented feature, it was long regarded as a bad idea. The fix for CVE-2012-3489 broke that capability, and rather than expend effort on trying to fix it, we're just going to summarily remove it. Prevent access to external files/URLs via XML entity references . xml_parse would attempt to fetch external files or URLs as needed to resolve DTD and entity references in an XML value, thus allowing unprivileged database users to attempt to fetch data with the privileges of the database server. While the external data wouldn't get returned directly to the user, portions of it could be exposed in error messages if the data didn't parse as valid XML; and in any case the mere ability to check existence of a file might be useful to an attacker . This advisory provides the latest versions of PostgreSQL that is not vulnerable to these issues.

Platform:
Mandriva Linux 2011.0
Product:
postgresql
Reference:
MDVSA-2012:139
CVE-2012-3488
CVE-2012-3489
CVE    2
CVE-2012-3489
CVE-2012-3488
CPE    1
cpe:/o:mandriva:linux:2011.0

© SecPod Technologies