6.5
CVSSv2

CVE-2009-4136

Published: 15/12/2009 Updated: 10/10/2018
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
VMScore: 580
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

PostgreSQL 7.4.x prior to 7.4.27, 8.0.x prior to 8.0.23, 8.1.x prior to 8.1.19, 8.2.x prior to 8.2.15, 8.3.x prior to 8.3.9, and 8.4.x prior to 8.4.2 does not properly manage session-local state during execution of an index function by a database superuser, which allows remote authenticated users to gain privileges via a table with crafted index functions, as demonstrated by functions that modify (1) search_path or (2) a prepared statement, a related issue to CVE-2007-6600 and CVE-2009-3230.

Vulnerable Product Search on Vulmon Subscribe to Product

postgresql postgresql 7.4.24

postgresql postgresql 7.4.9

postgresql postgresql 7.4.14

postgresql postgresql 7.4.15

postgresql postgresql 7.4.20

postgresql postgresql 7.4.21

postgresql postgresql 8.0.1

postgresql postgresql 8.0.2

postgresql postgresql 8.0.13

postgresql postgresql 8.0.9

postgresql postgresql 8.0.16

postgresql postgresql 8.0.22

postgresql postgresql 8.1.8

postgresql postgresql 8.1.2

postgresql postgresql 8.1.3

postgresql postgresql 8.1.15

postgresql postgresql 8.1.17

postgresql postgresql 8.2.4

postgresql postgresql 8.2

postgresql postgresql 8.2.10

postgresql postgresql 8.3.8

postgresql postgresql 8.3.3

postgresql postgresql 8.4.1

postgresql postgresql 7.4.5

postgresql postgresql 7.4.4

postgresql postgresql 7.4.10

postgresql postgresql 7.4.11

postgresql postgresql 7.4.22

postgresql postgresql 7.4.23

postgresql postgresql 8.0.20

postgresql postgresql 8.0.0

postgresql postgresql 8.0.7

postgresql postgresql 8.0.8

postgresql postgresql 8.0.19

postgresql postgresql 8.0.12

postgresql postgresql 8.1.10

postgresql postgresql 8.1.0

postgresql postgresql 8.1.11

postgresql postgresql 8.1.13

postgresql postgresql 8.2.2

postgresql postgresql 8.2.14

postgresql postgresql 8.2.6

postgresql postgresql 8.2.11

postgresql postgresql 8.3.5

postgresql postgresql 8.3.2

postgresql postgresql 7.4.3

postgresql postgresql 7.4.2

postgresql postgresql 7.4.8

postgresql postgresql 7.4.18

postgresql postgresql 7.4.1

postgresql postgresql 7.4.16

postgresql postgresql 7.4.17

postgresql postgresql 7.4.26

postgresql postgresql 8.0.11

postgresql postgresql 8.0.4

postgresql postgresql 8.0.3

postgresql postgresql 8.0.17

postgresql postgresql 8.0.18

postgresql postgresql 8.1.7

postgresql postgresql 8.1.16

postgresql postgresql 8.1.6

postgresql postgresql 8.1.9

postgresql postgresql 8.1.18

postgresql postgresql 8.2.3

postgresql postgresql 8.2.1

postgresql postgresql 8.2.7

postgresql postgresql 8.3.6

postgresql postgresql 8.3.7

postgresql postgresql 7.4.7

postgresql postgresql 7.4.6

postgresql postgresql 7.4.12

postgresql postgresql 7.4.13

postgresql postgresql 7.4.25

postgresql postgresql 7.4.19

postgresql postgresql 8.0.10

postgresql postgresql 8.0.14

postgresql postgresql 8.0.5

postgresql postgresql 8.0.6

postgresql postgresql 8.0.15

postgresql postgresql 8.0.21

postgresql postgresql 8.1.1

postgresql postgresql 8.1.4

postgresql postgresql 8.1.5

postgresql postgresql 8.1.12

postgresql postgresql 8.1.14

postgresql postgresql 8.2.12

postgresql postgresql 8.2.5

postgresql postgresql 8.2.9

postgresql postgresql 8.2.8

postgresql postgresql 8.2.13

postgresql postgresql 8.3.1

postgresql postgresql 8.3.4

Vendor Advisories

It was discovered that PostgreSQL did not properly handle certificates with NULL characters in the Common Name field of X509 certificates An attacker could exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications (CVE-2009-4034) ...
Several vulnerabilities have been discovered in PostgreSQL, a database server The Common Vulnerabilities and Exposures project identifies the following problems: It was discovered that PostgreSQL did not properly verify the Common Name attribute in X509 certificates, enabling attackers to bypass the (optional) TLS protection on client-server conn ...

References

NVD-CWE-Otherhttp://www.postgresql.org/support/security.htmlhttp://www.postgresql.org/docs/current/static/release-8-1-19.htmlhttps://bugzilla.redhat.com/show_bug.cgi?id=546321http://www.postgresql.org/docs/current/static/release-8-3-9.htmlhttp://www.postgresql.org/docs/current/static/release-8-2-15.htmlhttp://www.postgresql.org/docs/current/static/release-7-4-27.htmlhttp://www.postgresql.org/docs/current/static/release-8-4-2.htmlhttp://www.postgresql.org/docs/current/static/release-8-0-23.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2009:333http://www.vupen.com/english/advisories/2009/3519http://www.securityfocus.com/bid/37333http://secunia.com/advisories/37663https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01035.htmlhttps://www.redhat.com/archives/fedora-package-announce/2009-December/msg01056.htmlhttp://osvdb.org/61039http://www.securitytracker.com/id?1023326http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00007.htmlhttp://wiki.rpath.com/wiki/Advisories:rPSA-2010-0012http://www.redhat.com/support/errata/RHSA-2010-0428.htmlhttp://www.redhat.com/support/errata/RHSA-2010-0429.htmlhttp://www.redhat.com/support/errata/RHSA-2010-0427.htmlhttp://secunia.com/advisories/39820http://www.vupen.com/english/advisories/2010/1197http://marc.info/?l=bugtraq&m=134124585221119&w=2https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9358http://www.securityfocus.com/archive/1/509917/100/0/threadedhttps://usn.ubuntu.com/876-1/https://nvd.nist.gov