lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <1049949325.2560.5.camel@dhcp-253.int.wirex.com>
Date: 09 Apr 2003 21:35:25 -0700
From: WireX Security <security@...ex.com>
To: bugtraq@...urityfocus.com, immunix-announce@...unix.org,
	linsec@...ts.seifried.org
Subject: Immunix Secured OS 7+ PostgreSQL update

-----------------------------------------------------------------------
	Immunix Secured OS Security Advisory

Packages updated:	postgresql
Affected products:	Immunix 7.0, 7+
Bugs fixed:		CAN-2002-0972
			CAN-2002-1397
			CAN-2002-1398
			CAN-2002-1400
			CAN-2002-1401
			CAN-2002-1402
Date:			Tue Apr  8 2003
Advisory ID:		IMNX-2003-7+-005-01
Author:			Alan Olsen <alan@...ex.com>
-----------------------------------------------------------------------

Description:
  Multiple vulnerabilities have been discovered in PostgreSQL.

  CAN-2002-0972
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0972
  Buffer overflows in PostgreSQL 7.2 allow attackers to cause a denial of 
  service and possibly execute arbitrary code via long arguments to the 
  functions (1) lpad or (2) rpad.

  CAN-2002-1397
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1397
  Vulnerability in the cash_words() function for PostgreSQL 7.2 and earlier 
  allows local users to cause a denial of service and possibly execute 
  arbitrary code via a large negative argument, possibly triggering an 
  integer signedness error or buffer overflow.

  CAN-2002-1398
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1398
  Buffer overflow in the date parser for PostgreSQL before 7.2.2 allows 
  attackers to cause a denial of service and possibly execute arbitrary code 
  via a long date string, aka a vulnerability "in handling long datetime 
  input."

  CAN-2002-1400
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1400
  Heap-based buffer overflow in the repeat() function for PostgreSQL before 
  7.2.2 allows attackers to execute arbitrary code by causing repeat() to 
  generate a large string.

  CAN-2002-1401
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1401
  Buffer overflows in (1) circle_poly, (2) path_encode and (3) path_add 
  (also incorrectly identified as path_addr) for PostgreSQL 7.2.3 and 
  earlier allow attackers to cause a denial of service and possibly execute 
  arbitrary code, possibly as a result of an integer overflow.

  CAN-2002-1402
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1402
  Buffer overflows in the (1) TZ and (2) SET TIME ZONE enivronment variables 
  for PostgreSQL 7.2.1 and earlier allow local users to cause a denial of 
  service and possibly execute arbitrary code.

Package names and locations:
  Precompiled binary packages for Immunix 7+ are available at:

  http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/postgresql-7.0.2-18.2_imnx_1.i386.rpm
  http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/postgresql-devel-7.0.2-18.2_imnx_1.i386.rpm
  http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/postgresql-jdbc-7.0.2-18.2_imnx_1.i386.rpm
  http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/postgresql-odbc-7.0.2-18.2_imnx_1.i386.rpm
  http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/postgresql-perl-7.0.2-18.2_imnx_1.i386.rpm
  http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/postgresql-python-7.0.2-18.2_imnx_1.i386.rpm
  http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/postgresql-server-7.0.2-18.2_imnx_1.i386.rpm
  http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/postgresql-tcl-7.0.2-18.2_imnx_1.i386.rpm
  http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/postgresql-tk-7.0.2-18.2_imnx_1.i386.rpm  

Immunix OS 7+ md5sums:

  93baa0d9c42efabf50eacc52b4842977  postgresql-7.0.2-18.2_imnx_1.i386.rpm
  f3932ce27a695a5e5568b927994dc8be  postgresql-devel-7.0.2-18.2_imnx_1.i386.rpm
  1c21fa51b3e24242bc5c9651fb8e1805  postgresql-jdbc-7.0.2-18.2_imnx_1.i386.rpm
  8cc120126c031b47068ae2d6d673976c  postgresql-odbc-7.0.2-18.2_imnx_1.i386.rpm
  6e12763d405762a6874f0ff2f2a03154  postgresql-perl-7.0.2-18.2_imnx_1.i386.rpm
  a8504feff58d0c0adb771e5cce733302  postgresql-python-7.0.2-18.2_imnx_1.i386.rpm
  ecd038e70c31a72bbfd682d6ae172a01  postgresql-server-7.0.2-18.2_imnx_1.i386.rpm
  600f102d0bd36e876b05e65e2b2398e8  postgresql-tcl-7.0.2-18.2_imnx_1.i386.rpm
  f59244858a7992beead0ce789985a0f7  postgresql-tk-7.0.2-18.2_imnx_1.i386.rpm

GPG verification:                                                               
  Our public key is available at <http://wirex.com/security/GPG_KEY>.           

NOTE:
  Ibiblio is graciously mirroring our updates, so if the links above are
  slow, please try:
    ftp://ftp.ibiblio.org/pub/Linux/distributions/immunix/
  or one of the many mirrors available at:
    http://www.ibiblio.org/pub/Linux/MIRRORS.html

  ImmunixOS 6.2 is no longer officially supported.
  ImmunixOS 7.0 is no longer officially supported.

Contact information:
  To report vulnerabilities, please contact security@...ex.com. WireX 
  attempts to conform to the RFP vulnerability disclosure protocol
  <http://www.wiretrip.net/rfp/policy.html>.




Download attachment "signature.asc" of type "application/pgp-signature" (233 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ