发布时间 :2006-05-24 06:06:00
修订时间 :2017-10-10 21:30:53

[原文]PostgreSQL 8.1.x before 8.1.4, 8.0.x before 8.0.8, 7.4.x before 7.4.13, 7.3.x before 7.3.15, and earlier versions allows context-dependent attackers to bypass SQL injection protection methods in applications via invalid encodings of multibyte characters, aka one variant of "Encoding-Based SQL Injection."

[CNNVD]PostgreSQL 多个SQL注入漏洞(CNNVD-200605-460)

        1 远程攻击者可以在SQL命令中嵌入特制字符串,使用无效编码的多字节字符绕过标准的字符转义模式,导致向数据库注入恶意的SQL命令。
        2 如果允许将0x5c(反斜线的ASCII码)用作多字节字符的结尾字节的话,则在处理这个多字节时将ASCII单引号"'"转义为"\'"的操作存在漏洞。这至少包括SJIS、BIG5、GBK、GB18030和UHC。如果在SQL命令中嵌入了不可信任字符,则在进行上述转换时存在SQL注入漏洞。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:postgresql:postgresql:7.3 PostgreSQL 7.3
cpe:/a:postgresql:postgresql:7.4PostgreSQL PostgreSQL 7.4
cpe:/a:postgresql:postgresql:7.4.1PostgreSQL PostgreSQL 7.4.1
cpe:/a:postgresql:postgresql:7.4.2PostgreSQL PostgreSQL 7.4.2
cpe:/a:postgresql:postgresql:7.4.3PostgreSQL PostgreSQL 7.4.3
cpe:/a:postgresql:postgresql:7.4.4PostgreSQL PostgreSQL 7.4.4
cpe:/a:postgresql:postgresql:7.4.5PostgreSQL PostgreSQL 7.4.5
cpe:/a:postgresql:postgresql:7.4.6PostgreSQL PostgreSQL 7.4.6
cpe:/a:postgresql:postgresql:7.4.7PostgreSQL PostgreSQL 7.4.7
cpe:/a:postgresql:postgresql:7.4.8PostgreSQL PostgreSQL 7.4.8
cpe:/a:postgresql:postgresql:7.4.9PostgreSQL PostgreSQL 7.4.9
cpe:/a:postgresql:postgresql:7.4.10PostgreSQL PostgreSQL 7.4.10
cpe:/a:postgresql:postgresql:7.4.11PostgreSQL PostgreSQL 7.4.11
cpe:/a:postgresql:postgresql:7.4.12PostgreSQL PostgreSQL 7.4.12
cpe:/a:postgresql:postgresql:8.0PostgreSQL 8.0
cpe:/a:postgresql:postgresql:8.0.1PostgreSQL PostgreSQL 8.0.1
cpe:/a:postgresql:postgresql:8.0.2PostgreSQL PostgreSQL 8.0.2
cpe:/a:postgresql:postgresql:8.0.3PostgreSQL PostgreSQL 8.0.3
cpe:/a:postgresql:postgresql:8.0.4PostgreSQL PostgreSQL 8.0.4
cpe:/a:postgresql:postgresql:8.0.5PostgreSQL PostgreSQL 8.0.5
cpe:/a:postgresql:postgresql:8.0.6PostgreSQL PostgreSQL 8.0.6
cpe:/a:postgresql:postgresql:8.0.7PostgreSQL PostgreSQL 8.0.7
cpe:/a:postgresql:postgresql:8.1PostgreSQL 8.1
cpe:/a:postgresql:postgresql:8.1.1PostgreSQL 8.1.1
cpe:/a:postgresql:postgresql:8.1.2PostgreSQL 8.1.2
cpe:/a:postgresql:postgresql:8.1.3PostgreSQL 8.1.3

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:10618PostgreSQL 8.1.x before 8.1.4, 8.0.x before 8.0.8, 7.4.x before 7.4.13, 7.3.x before 7.3.15, and earlier versions allows context-dependent a...

- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  SGI  20060602-01-U
(PATCH)  MLIST  [pgsql-announce] 20060523 Security Releases for All Active Versions
(UNKNOWN)  BUGTRAQ  20060523 PostgreSQL security releases 8.1.4, 8.0.8, 7.4.13, 7.3.15
(UNKNOWN)  BUGTRAQ  20060524 rPSA-2006-0080-1 postgresql postgresql-server
(UNKNOWN)  BID  18092
(UNKNOWN)  TRUSTIX  2006-0032
(UNKNOWN)  VUPEN  ADV-2006-1941
(UNKNOWN)  XF  postgresql-multibyte-sql-injection(26627)

- 漏洞信息

PostgreSQL 多个SQL注入漏洞
高危 SQL注入
2006-05-24 00:00:00 2006-05-25 00:00:00
        1 远程攻击者可以在SQL命令中嵌入特制字符串,使用无效编码的多字节字符绕过标准的字符转义模式,导致向数据库注入恶意的SQL命令。
        2 如果允许将0x5c(反斜线的ASCII码)用作多字节字符的结尾字节的话,则在处理这个多字节时将ASCII单引号"'"转义为"\'"的操作存在漏洞。这至少包括SJIS、BIG5、GBK、GB18030和UHC。如果在SQL命令中嵌入了不可信任字符,则在进行上述转换时存在SQL注入漏洞。

- 公告与补丁


- 漏洞信息 (F47016)

Debian Linux Security Advisory 1087-1 (PacketStormID:F47016)
2006-06-05 00:00:00

Debian Security Advisory 1087-1 - Several encoding problems have been discovered in PostgreSQL, a popular SQL database.

Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 1087-1                                       Martin Schulze
June 3rd, 2006                
- --------------------------------------------------------------------------

Package        : postgresql
Vulnerability  : programming error
Problem type   : remote
Debian-specific: no
CVE IDs        : CVE-2006-2313 CVE-2006-2314

Several encoding problems have been discovered in PostgreSQL, a
popular SQL database.  The Common Vulnerabilities and Exposures
project identifies the following problems:


    Akio Ishida and Yasuo Ohgaki discovered a weakness in the handling
    of invalidly-encoded multibyte text data which could allow an
    attacker to inject arbitrary SQL commands.


    A similar problem exists in client-side encodings (such as SJIS,
    BIG5, GBK, GB18030, and UHC) which contain valid multibyte
    characters that end with the backslash character.  An attacker
    could supply a specially crafted byte sequence that is able to
    inject arbitrary SQL commands.

    This issue does not affect you if you only use single-byte (like
    SQL_ASCII or the ISO-8859-X family) or unaffected multibyte (like
    UTF-8) encodings.

    psycopg and python-pgsql use the old encoding for binary data and
    may have to be updated.

The old stable distribution (woody) is affected by these problems but
we're unable to correct the package.

For the stable distribution (sarge) these problems have been fixed in
version 7.4.7-6sarge2.

For the unstable distribution (sid) these problems have been fixed in
version 7.4.13-1.

We recommend that you upgrade your postgresql packages.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given at the end of this advisory:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:
      Size/MD5 checksum:      985 78d63a976c27999c86bbd57f70eae80d
      Size/MD5 checksum:   189611 577fb231aac4f86692e935b6a30eb1f4
      Size/MD5 checksum:  9952102 d193c58aef02a745e8657c48038587ac

  Architecture independent components:
      Size/MD5 checksum:  2266882 86068a0b0bd5f3353746555933d29317

  Alpha architecture:
      Size/MD5 checksum:   239980 bb173b640c9f206c320d20b554d724fa
      Size/MD5 checksum:   104826 0d4a8d8aea91799bc70617f9e47b5b29
      Size/MD5 checksum:    82408 f4a3dad48412573e5b993c4d9e7400f1
      Size/MD5 checksum:    61972 7cc403fea81613636d180358568638ca
      Size/MD5 checksum:   139496 bede365b3e3505f79cb734747744fd5e
      Size/MD5 checksum:  4153162 86740fcfb886861702c8bccbcfb7a8be
      Size/MD5 checksum:   614270 16108bc1a5cc9d7d51337597e2f5090c
      Size/MD5 checksum:   701704 de550242e2d5cbbf0d9c24aad75a4977
      Size/MD5 checksum:   546150 d9c95cc8ac6e21509b13640d0589c46c

  AMD64 architecture:
      Size/MD5 checksum:   210208 602e081a5b8ef164d0d7114cfbb002e2
      Size/MD5 checksum:    96442 ecdcbc5b59750b9871d49e3319a18fb8
      Size/MD5 checksum:    79380 ca54542f754ac5da8c992f5889c12cc9
      Size/MD5 checksum:    56212 364aaa1ac5a22e12262b90314f060d33
      Size/MD5 checksum:   131638 82fcd52b9cb9c93afb1e9545df89ee28
      Size/MD5 checksum:  3887452 f408a28bc585b4f98e72e343813316be
      Size/MD5 checksum:   559516 2b31c9a4fc43ab7ca0d9dd2f55dd1bb9
      Size/MD5 checksum:   654962 0b5970688a0f4ed4476ea80196b3e33d
      Size/MD5 checksum:   519740 b291ff79aa9dcf4c94b4f544222b6e3c

  ARM architecture:
      Size/MD5 checksum:   216872 60267ccd42ebc905fbed60faf15ce7c8
      Size/MD5 checksum:    92170 6f866dbf0695c4857d73dbd9c538caa7
      Size/MD5 checksum:    76290 53279156767dd6b03ebde6a1a7a6e9d5
      Size/MD5 checksum:    56338 14809b9f1149cc9a09b2b7f65efffd07
      Size/MD5 checksum:   124098 72f5fa7ae580925a88a2d3dd8fc96c3d
      Size/MD5 checksum:  3789942 b819ecda4f08a2f321942e6efd760e35
      Size/MD5 checksum:   534538 b1cd2927aaf7a59ebe9274e9d88beff9
      Size/MD5 checksum:   628216 a94c9d9207b560b6eed5fd823bdd5406
      Size/MD5 checksum:   518454 db9f0c0c6ab0c0c3a504c5a1faf93d54

  Intel IA-32 architecture:
      Size/MD5 checksum:   207204 aafafd90bea915cfce42e4cc8997a7ae
      Size/MD5 checksum:    95146 fbccb71b54ddae5b4f0100262e546edd
      Size/MD5 checksum:    78032 c2199f8932f9af670103bae577da7928
      Size/MD5 checksum:    55678 ba9771127582d3c4d041d0ebd54714f8
      Size/MD5 checksum:   128310 fcdcfa9995f3929c4af97fa75540fdf8
      Size/MD5 checksum:  3799030 0d851c1ad83ba723ca81009464c69f71
      Size/MD5 checksum:   539660 c3511e4e1935e5e741e630b33828492f
      Size/MD5 checksum:   625940 32bb7a6139270dd119f72a7b708a6c54
      Size/MD5 checksum:   516050 9aa8818dec80c8830fde3b0d6849d310

  Intel IA-64 architecture:
      Size/MD5 checksum:   250406 02e0cd73738b871e12fe07d435f502e8
      Size/MD5 checksum:   117496 0b12feda47694da718abaa8b82e3a7df
      Size/MD5 checksum:    91804 c75fd48f53fa84033593c5000c4e2ba1
      Size/MD5 checksum:    60582 c81d60f2b9fcafc17bf2c890f62a67af
      Size/MD5 checksum:   152570 657268cc59f43720a4fbcd7401f68a51
      Size/MD5 checksum:  4408476 6b9c54e4e402f7f2dd0bab017b53b066
      Size/MD5 checksum:   682300 919925ab2e1e3f0214223ec4d557198f
      Size/MD5 checksum:   776054 17a52e7ee887815ea0eca17db214e143
      Size/MD5 checksum:   543558 304d71b16b2de34209431a6e4f5f47b4

  HP Precision architecture:
      Size/MD5 checksum:   217744 7ea61b426c2ead22a87d8e6b2b8cbc06
      Size/MD5 checksum:   104378 cb8adb9c1dd2bc415a6157fa12f928e5
      Size/MD5 checksum:    83740 3799d1cfececc128d9a6a790c08a86c7
      Size/MD5 checksum:    58682 3caab961a85db146b0d37f982af37622
      Size/MD5 checksum:   134686 5a730cd2793948c69aacb82d00124259
      Size/MD5 checksum:  4263326 56aa2f4f1caab2fddf15b8c0c960c426
      Size/MD5 checksum:   572462 2989c44d3ed16aff10af1bbdfee973f8
      Size/MD5 checksum:   686150 ad186c53d5cf30ec79bd5f7a8de97a7c
      Size/MD5 checksum:   523900 eb948f532e5cfdebe504925a73103c9d

  Motorola 680x0 architecture:
      Size/MD5 checksum:   194254 60cb0f51cdb1e8c270bf5092b8d8255c
      Size/MD5 checksum:    89926 557536dec7b52d56abd80da0e3395204
      Size/MD5 checksum:    76946 8d5b8aaaad2faef72647dab6bf74a706
      Size/MD5 checksum:    53920 d8a7c7dfde0b9848c9b820b1b021013b
      Size/MD5 checksum:   125348 e2a9707ad1ac5f7fe1c1f2455242bc2c
      Size/MD5 checksum:  3974176 da72953d869784679784c9753972128f
      Size/MD5 checksum:   510460 0c3be055f6a3e09377c5669e25ee6cc3
      Size/MD5 checksum:   608894 52181b4b31ca796c2a67737706c2d732
      Size/MD5 checksum:   507366 b47589dc8e2cba5f2484136ae1360bd8

  Big endian MIPS architecture:
      Size/MD5 checksum:   209612 24ecb0017cc2d0213c9ae14def963f7c
      Size/MD5 checksum:    95740 7bc16022786a15ce296cc450bad14690
      Size/MD5 checksum:    80856 4ae6337bf3f0749e5646398025b4ca3a
      Size/MD5 checksum:    56260 32e7db2cc80977c8202f4dd11e4d37c0
      Size/MD5 checksum:   128346 19627a5e0dab29be81b092ef9a064f1c
      Size/MD5 checksum:  4171356 e97e1b50aa6ce9f1b3963d9ab20eeacc
      Size/MD5 checksum:   582144 804d77b5e1089b5b39e57eb228836aca
      Size/MD5 checksum:   641800 4b006574dbeda3bcedc514ca12433b10
      Size/MD5 checksum:   521302 8d1b8b6bc9bc640761909527c425083a

  Little endian MIPS architecture:
      Size/MD5 checksum:   207620 1b974ad276e845a8b9da8afb88b20118
      Size/MD5 checksum:    95932 06b9e5d8fd2e82c622febe7faf7b2be7
      Size/MD5 checksum:    80612 7a2d7bbd54b8f08aa09c2cd307d3d2be
      Size/MD5 checksum:    56322 22475b9bc5de36f15ad8560795455133
      Size/MD5 checksum:   128422 f6fbc5968a69601bcf94d71ad0f88532
      Size/MD5 checksum:  3862226 e4424c77620f0c30beb7d8ac0e253d9f
      Size/MD5 checksum:   581426 ed5a9b2a615bdfcc7036287667502038
      Size/MD5 checksum:   641240 dc49d2bcf81a25280664c73b1af8797b
      Size/MD5 checksum:   521720 5ff500cb5542403582240c7e37bbcdda

  PowerPC architecture:
      Size/MD5 checksum:   210904 48e1dd207b4b025e80b35406d75b43ee
      Size/MD5 checksum:   100428 901be88d71fc0e06ccf3e50fb4151b93
      Size/MD5 checksum:    84596 72fbac10fd10eedcc4ef1673e5ad57b2
      Size/MD5 checksum:    55326 96fcce34e09b75e683c09e63d94b0ac2
      Size/MD5 checksum:   129898 6467b522f8bcf577a5a5eac47e695e5f
      Size/MD5 checksum:  4203052 1f019762641079d46b162b4ad2837458
      Size/MD5 checksum:   565430 a305cd9acfcec0d648edb56eaae2f605
      Size/MD5 checksum:   686040 3d34c6d9faf50a6c88c736364895cbdf
      Size/MD5 checksum:   516676 c2e91f20faa7669ab94fae166f94cac5

  IBM S/390 architecture:
      Size/MD5 checksum:   208296 1ceaec0962943f05b7cb930c5a8ec5f0
      Size/MD5 checksum:    97814 73b521d57581888ffa97f4c519aa2b78
      Size/MD5 checksum:    80456 704e9ef41e3f89e610f7400c998ce88c
      Size/MD5 checksum:    56994 b135a1197a5b47a4070a07ffceb33348
      Size/MD5 checksum:   133966 f80f2bfb7a971fd9ff4f3266c9fdddcd
      Size/MD5 checksum:  4161698 8dac213b26c2f64b394ead91cf796c8e
      Size/MD5 checksum:   549568 a82366bd7a49ca2e2c3f84a0f99b61b2
      Size/MD5 checksum:   665482 6d7faf109031c6f295966e65bd69ed79
      Size/MD5 checksum:   520664 3ebbbcd84b599632d3b74a6aa5cfbd9e

  Sun Sparc architecture:
      Size/MD5 checksum:   205870 9fe5eac55d9ecb77cde27081e43fa2e2
      Size/MD5 checksum:    93606 1ef27ddd79e25a9de9f65673076ccbed
      Size/MD5 checksum:    77926 525d22dd799578af00d5ee3e09718dbd
      Size/MD5 checksum:    56150 07daedfabe9931672c7fced5ef515708
      Size/MD5 checksum:   127594 e488f86dcbce2df62c3dbfe56766d1c2
      Size/MD5 checksum:  4091222 6c3cbbb9965d35a5813ea78abac52645
      Size/MD5 checksum:   535876 f914be88ee8da6b67cc3af31db4ef42b
      Size/MD5 checksum:   633208 f23620f4d6708b1946e85349372e3048
      Size/MD5 checksum:   514344 6d8417121070e1faa09936e6ac9b943f

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list:
Package info: `apt-cache show <pkg>' and<pkg>

Version: GnuPG v1.4.3 (GNU/Linux)



- 漏洞信息

PostgreSQL Invalidly-encoded Multibyte Character String Escaping Bypass
Vendor Verified

- 漏洞描述

Unknown or Incomplete

- 时间线

2006-05-22 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 7.3.15, 7.4.13, 8.0.8, 8.1.4 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

PostgreSQL Multibyte Character Encoding SQL Injection Vulnerabilities
Input Validation Error 18092
Yes No
2006-05-24 12:00:00 2006-11-29 08:59:00
Akio Ishida and Yasuo Ohgaki discovered these issues.

- 受影响的程序版本

Wietse Venema Postfix 2.2.10
Wietse Venema Postfix 2.2.4
Wietse Venema Postfix 2.1.5
+ Ubuntu Ubuntu Linux 4.1 ppc
+ Ubuntu Ubuntu Linux 4.1 ia64
+ Ubuntu Ubuntu Linux 4.1 ia32
Wietse Venema Postfix 2.1
University of Cambridge Exim 4.60
University of Cambridge Exim 4.52
University of Cambridge Exim 4.34
+ Ubuntu Ubuntu Linux 4.1 ppc
+ Ubuntu Ubuntu Linux 4.1 ia64
+ Ubuntu Ubuntu Linux 4.1 ia32
Ubuntu Ubuntu Linux 5.10 powerpc
Ubuntu Ubuntu Linux 5.10 i386
Ubuntu Ubuntu Linux 5.10 amd64
Ubuntu Ubuntu Linux 5.0 4 powerpc
Ubuntu Ubuntu Linux 5.0 4 i386
Ubuntu Ubuntu Linux 5.0 4 amd64
Ubuntu Ubuntu Linux 6.06 LTS powerpc
Ubuntu Ubuntu Linux 6.06 LTS i386
Ubuntu Ubuntu Linux 6.06 LTS amd64
Turbolinux Appliance Server Workgroup Edition 1.0
Turbolinux Appliance Server Hosting Edition 1.0
Turbolinux Appliance Server 1.0 Workgroup Edition
Turbolinux Appliance Server 1.0 Hosting Edition
Trustix Secure Linux 3.0
Trustix Secure Linux 2.2
Trustix Secure Enterprise Linux 2.0
Trend Micro InterScan VirusWall 8.0
TransSoft Broker FTP Server 8.0
TransSoft Broker FTP Server 7.0
SuSE SUSE Linux Enterprise Server 8
+ Linux kernel 2.4.21
+ Linux kernel 2.4.19
SuSE SUSE Linux Enterprise Server 10
SuSE SUSE Linux Enterprise Desktop 10
SGI ProPack 3.0 SP6
S.u.S.E. UnitedLinux 1.0
S.u.S.E. SuSE Linux Standard Server 8.0
S.u.S.E. SuSE Linux School Server for i386
S.u.S.E. SUSE LINUX Retail Solution 8.0
S.u.S.E. Open-Enterprise-Server 9.0
S.u.S.E. Open-Enterprise-Server 1
S.u.S.E. Office Server
S.u.S.E. Novell Linux Desktop 9.0
S.u.S.E. Novell Linux Desktop 1.0
S.u.S.E. Linux Professional 10.0 OSS
S.u.S.E. Linux Professional 10.0
S.u.S.E. Linux Professional 9.3 x86_64
S.u.S.E. Linux Professional 9.3
S.u.S.E. Linux Professional 9.2 x86_64
S.u.S.E. Linux Professional 9.2
S.u.S.E. Linux Professional 9.1 x86_64
S.u.S.E. Linux Professional 9.1
S.u.S.E. Linux Professional 10.1
S.u.S.E. Linux Personal 10.0 OSS
S.u.S.E. Linux Personal 9.3 x86_64
S.u.S.E. Linux Personal 9.3
S.u.S.E. Linux Personal 9.2 x86_64
S.u.S.E. Linux Personal 9.2
S.u.S.E. Linux Personal 9.1 x86_64
S.u.S.E. Linux Personal 9.1
S.u.S.E. Linux Personal 10.1
S.u.S.E. Linux Openexchange Server
S.u.S.E. Linux Office Server
S.u.S.E. Linux Enterprise Server for S/390 9.0
S.u.S.E. Linux Enterprise Server for S/390
S.u.S.E. Linux Enterprise Server 9
S.u.S.E. Linux Desktop 1.0
S.u.S.E. Linux Database Server 0
S.u.S.E. Linux Connectivity Server
RedHat Enterprise Linux WS 4
RedHat Enterprise Linux WS 3
RedHat Enterprise Linux ES 4
RedHat Enterprise Linux ES 3
RedHat Desktop 4.0
RedHat Desktop 3.0
Red Hat Fedora Core5
Red Hat Fedora Core4
Red Hat Enterprise Linux AS 4
Red Hat Enterprise Linux AS 3
PostgreSQL PostgreSQL 8.1.3
PostgreSQL PostgreSQL 8.1.1
PostgreSQL PostgreSQL 8.0.7
PostgreSQL PostgreSQL 8.0.5
PostgreSQL PostgreSQL 8.0.4
PostgreSQL PostgreSQL 8.0.3
PostgreSQL PostgreSQL 8.0.2
+ Trustix Secure Linux 2.2
PostgreSQL PostgreSQL 8.0.1
PostgreSQL PostgreSQL 8.0
+ Trustix Secure Linux 2.2
PostgreSQL PostgreSQL 7.4.12
PostgreSQL PostgreSQL 7.4.11
PostgreSQL PostgreSQL 7.4.10
PostgreSQL PostgreSQL 7.4.9
PostgreSQL PostgreSQL 7.4.8
PostgreSQL PostgreSQL 7.4.7
PostgreSQL PostgreSQL 7.4.6
+ Trustix Secure Linux 2.1
PostgreSQL PostgreSQL 7.4.5
PostgreSQL PostgreSQL 7.4.4
PostgreSQL PostgreSQL 7.4.3
PostgreSQL PostgreSQL 7.4.2
PostgreSQL PostgreSQL 7.4.1
PostgreSQL PostgreSQL 7.4
PostgreSQL PostgreSQL 7.3.14
PostgreSQL PostgreSQL 7.3.13
PostgreSQL PostgreSQL 7.3.12
PostgreSQL PostgreSQL 7.3.11
PostgreSQL PostgreSQL 7.3.10
PostgreSQL PostgreSQL 7.3.9
PostgreSQL PostgreSQL 7.3.8
PostgreSQL PostgreSQL 7.3.6
PostgreSQL PostgreSQL 7.3.4
+ OpenPKG OpenPKG Current
PostgreSQL PostgreSQL 7.3.3
PostgreSQL PostgreSQL 7.3.2
PostgreSQL PostgreSQL 7.3.1
PostgreSQL PostgreSQL 7.3
PDGSoft Shopping Cart 8.1.2
PDGSoft Shopping Cart 8.1
PDGSoft Shopping Cart 8.0.6
Mandriva Linux Mandrake 2006.0 x86_64
Mandriva Linux Mandrake 2006.0
Mandriva Linux Mandrake 10.2 x86_64
Mandriva Linux Mandrake 10.2
MandrakeSoft Corporate Server 3.0 x86_64
MandrakeSoft Corporate Server 3.0
Gentoo dev-db/postgresql 8.0.7
Dovecot Dovecot 0.99.14
Dovecot Dovecot 0.99.13
Debian Linux 3.1 sparc
Debian Linux 3.1 s/390
Debian Linux 3.1 ppc
Debian Linux 3.1 mipsel
Debian Linux 3.1 mips
Debian Linux 3.1 m68k
Debian Linux 3.1 ia-64
Debian Linux 3.1 ia-32
Debian Linux 3.1 hppa
Debian Linux 3.1 arm
Debian Linux 3.1 amd64
Debian Linux 3.1 alpha
Debian Linux 3.1
Debian Linux 3.0 sparc
Debian Linux 3.0 s/390
Debian Linux 3.0 ppc
Debian Linux 3.0 mipsel
Debian Linux 3.0 mips
Debian Linux 3.0 m68k
Debian Linux 3.0 ia-64
Debian Linux 3.0 ia-32
Debian Linux 3.0 hppa
Debian Linux 3.0 arm
Debian Linux 3.0 alpha
Debian Linux 3.0
Avaya S8710 R2.0.1
Avaya S8710 R2.0.0
Avaya S8700 R2.0.1
Avaya S8700 R2.0.0
Avaya S8500 R2.0.1
Avaya S8500 R2.0.0
Avaya S8300 R2.0.1
Avaya S8300 R2.0.0
Avaya Messaging Storage Server
Avaya Message Networking
Avaya Intuity LX
Avaya Converged Communications Server 2.0
Avaya Aura SIP Enablement Services 3.1
Avaya Aura SIP Enablement Services 3.0
PostgreSQL PostgreSQL 8.1.4
PostgreSQL PostgreSQL 8.0.8
PostgreSQL PostgreSQL 7.4.13
PostgreSQL PostgreSQL 7.3.15

- 不受影响的程序版本

PostgreSQL PostgreSQL 8.1.4
PostgreSQL PostgreSQL 8.0.8
PostgreSQL PostgreSQL 7.4.13
PostgreSQL PostgreSQL 7.3.15

- 漏洞讨论

PostgreSQL is prone to SQL-injection vulnerabilities. These issues are due to a potential mismatch of multibyte character conversions between PostgreSQL servers and client applications.

A successful exploit could allow an attacker to execute arbitrary SQL statements on affected servers. This may allow the attacker to compromise the targeted computer, access or modify data, or exploit other latent vulnerabilities.

PostgreSQL versions prior to 7.3.15, 7.4.13, 8.0.8, and 8.1.4 are vulnerable to these issues.

- 漏洞利用

Attackers exploit these issues by interacting with database-using applications. No specific exploit code is required.

- 解决方案

The vendor has released fixes to address these issues.

Please see the referenced advisories for information on obtaining and applying fixes.

Dovecot Dovecot 0.99.14

Wietse Venema Postfix 2.1.5

Wietse Venema Postfix 2.2.10

University of Cambridge Exim 4.34

University of Cambridge Exim 4.60

PostgreSQL PostgreSQL 7.3

PostgreSQL PostgreSQL 7.3.11

PostgreSQL PostgreSQL 7.3.12

PostgreSQL PostgreSQL 7.3.13

PostgreSQL PostgreSQL 7.3.14

PostgreSQL PostgreSQL 7.3.4

PostgreSQL PostgreSQL 7.4.11

PostgreSQL PostgreSQL 7.4.12

PostgreSQL PostgreSQL 7.4.2

PostgreSQL PostgreSQL 7.4.3

PostgreSQL PostgreSQL 7.4.4

PostgreSQL PostgreSQL 7.4.6

PostgreSQL PostgreSQL 7.4.8

PostgreSQL PostgreSQL 8.0

PostgreSQL PostgreSQL 8.0.2

PostgreSQL PostgreSQL 8.0.3

- 相关参考