ID |
CVE-2007-3279
|
Summary |
PostgreSQL 8.1 and probably later versions, when the PL/pgSQL (plpgsql) language has been created, grants certain plpgsql privileges to the PUBLIC domain, which allows remote attackers to create and execute functions, as demonstrated by functions that perform local brute-force password guessing attacks, which may evade intrusion detection. |
References |
|
Vulnerable Configurations |
|
CVSS |
Base: | 10.0 (as of 16-10-2018 - 16:48) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-Other |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
COMPLETE |
COMPLETE |
COMPLETE |
|
cvss-vector
via4
|
AV:N/AC:L/Au:N/C:C/I:C/A:C
|
refmap
via4
|
bugtraq | 20070616 Having Fun With PostgreSQL | mandriva | MDKSA-2007:188 | misc | | osvdb | 40900 | xf | postgresql-dblink-weak-security(35144) |
|
statements
via4
|
contributor | Mark J Cox | lastmodified | 2007-09-28 | organization | Red Hat | statement | Red Hat does not consider this do be a security issue. Creating functions is intended feature of the PL/pgSQL language and is definitely not a security problem. Weak passwords are generally more likely to be guessed with brute force attacks and choosing a strong password according to good practices is considered to be a sufficent protection against this kind of attack.
|
|
Last major update |
16-10-2018 - 16:48 |
Published |
19-06-2007 - 21:30 |
Last modified |
16-10-2018 - 16:48 |