CVE-2013-1901
Published Apr 4, 2013
Last updated 11 years ago
Overview
- Description
- PostgreSQL 9.2.x before 9.2.4 and 9.1.x before 9.1.9 does not properly check REPLICATION privileges, which allows remote authenticated users to bypass intended backup restrictions by calling the (1) pg_start_backup or (2) pg_stop_backup functions.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4
- Impact score
- 2.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-264
Evaluator
- Comment
- -
- Impact
- Per http://www.ubuntu.com/usn/USN-1789-1/ "A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 12.10 Ubuntu 12.04 LTS Ubuntu 11.10 Ubuntu 10.04 LTS Ubuntu 8.04 LTS"
- Solution
- Per http://www.ubuntu.com/usn/USN-1789-1/ "A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 12.10 Ubuntu 12.04 LTS Ubuntu 11.10 Ubuntu 10.04 LTS Ubuntu 8.04 LTS"
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD27648F-E2FF-4779-97F9-2632DCC6B16D" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CEFB4916-8B59-4534-804C-CF9DA1B18508" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3413A3AB-45A3-48E1-9B30-1194C4E7D49D" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5760CE83-4802-42A0-9338-E1E634882450" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4796DBEC-FF4F-4749-90D5-AD83D8B5E086" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "79108278-D644-4506-BD9C-F464C6E817B7" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10CF0AA0-41CD-4D50-BA7A-BF8846115C95" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "965E1A9D-BB23-4C0B-A9CA-54A1855055B1" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A1F37C66-0AFE-4D59-8867-BDBCE656774E" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:9.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5CE53AE6-232C-4068-98D1-7749007C3CFD" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:9.1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FFD38139-FD17-41E7-8D10-7731D8203CFC" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:9.1.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CCC0B41F-38FF-4D41-9E31-D666A84BB2FC" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:9.1.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A591CB08-5CEB-45EB-876F-417DCD60AF53" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D6DFE2D3-46E2-4D0C-8508-30307D654560" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7118F616-25CA-4E34-AA13-4D14BB62419F" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E4174F4F-149E-41A6-BBCC-D01114C05F38" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F5D324C4-97C7-49D3-A809-9EAD4B690C69" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE" } ], "operator": "OR" } ] } ]