CVE-2006-2314
CVSS7.5
发布时间 :2006-05-24 06:06:00
修订时间 :2011-03-07 21:35:56
NMCOP    

[原文]PostgreSQL 8.1.x before 8.1.4, 8.0.x before 8.0.8, 7.4.x before 7.4.13, 7.3.x before 7.3.15, and earlier versions allows context-dependent attackers to bypass SQL injection protection methods in applications that use multibyte encodings that allow the "\" (backslash) byte 0x5c to be the trailing byte of a multibyte character, such as SJIS, BIG5, GBK, GB18030, and UHC, which cannot be handled correctly by a client that does not understand multibyte encodings, aka a second variant of "Encoding-Based SQL Injection." NOTE: it could be argued that this is a class of issue related to interaction errors between the client and PostgreSQL, but a CVE has been assigned since PostgreSQL is treating this as a preventative measure against this class of problem.


[CNNVD]PostgreSQL 多个SQL注入漏洞(CNNVD-200605-468)

        PostgreSQL是一款高级对象-关系型数据库管理系统,支持扩展的SQL标准子集。
        PostgreSQL中存在多个SQL注入漏洞:
        1 远程攻击者可以在SQL命令中嵌入特制字符串,使用无效编码的多字节字符绕过标准的字符转义模式,导致向数据库注入恶意的SQL命令。
        2 如果允许将0x5c(反斜线的ASCII码)用作多字节字符的结尾字节的话,则在处理这个多字节时将ASCII单引号"'"转义为"\'"的操作存在漏洞。这至少包括SJIS、BIG5、GBK、GB18030和UHC。如果在SQL命令中嵌入了不可信任字符,则在进行上述转换时存在SQL注入漏洞。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:postgresql:postgresql:7.3.6
cpe:/a:postgresql:postgresql:7.4.11PostgreSQL PostgreSQL 7.4.11
cpe:/a:postgresql:postgresql:8.1.1PostgreSQL 8.1.1
cpe:/a:postgresql:postgresql:7.3.11
cpe:/a:postgresql:postgresql:7.3.13
cpe:/a:postgresql:postgresql:7.4.9PostgreSQL PostgreSQL 7.4.9
cpe:/a:postgresql:postgresql:7.3.14
cpe:/a:postgresql:postgresql:8.0.2PostgreSQL PostgreSQL 8.0.2
cpe:/a:postgresql:postgresql:7.4.1PostgreSQL PostgreSQL 7.4.1
cpe:/a:postgresql:postgresql:7.3.4
cpe:/a:postgresql:postgresql:7.3.8
cpe:/a:postgresql:postgresql:8.0PostgreSQL 8.0
cpe:/a:postgresql:postgresql:7.3.10
cpe:/a:postgresql:postgresql:7.4.5PostgreSQL PostgreSQL 7.4.5
cpe:/a:postgresql:postgresql:7.3.3
cpe:/a:postgresql:postgresql:7.3.7
cpe:/a:postgresql:postgresql:7.3.1
cpe:/a:postgresql:postgresql:7.4.7PostgreSQL PostgreSQL 7.4.7
cpe:/a:postgresql:postgresql:7.3.2
cpe:/a:postgresql:postgresql:7.4.10PostgreSQL PostgreSQL 7.4.10
cpe:/a:postgresql:postgresql:8.0.7PostgreSQL PostgreSQL 8.0.7
cpe:/a:postgresql:postgresql:7.4.4PostgreSQL PostgreSQL 7.4.4
cpe:/a:postgresql:postgresql:8.0.5PostgreSQL PostgreSQL 8.0.5
cpe:/a:postgresql:postgresql:7.4PostgreSQL PostgreSQL 7.4
cpe:/a:postgresql:postgresql:7.4.3PostgreSQL PostgreSQL 7.4.3
cpe:/a:postgresql:postgresql:7.3.9
cpe:/a:postgresql:postgresql:7.4.6PostgreSQL PostgreSQL 7.4.6
cpe:/a:postgresql:postgresql:8.1.2PostgreSQL 8.1.2
cpe:/a:postgresql:postgresql:7.3 PostgreSQL 7.3
cpe:/a:postgresql:postgresql:7.4.8PostgreSQL PostgreSQL 7.4.8
cpe:/a:postgresql:postgresql:7.3.12
cpe:/a:postgresql:postgresql:8.1.3PostgreSQL 8.1.3
cpe:/a:postgresql:postgresql:7.3.5
cpe:/a:postgresql:postgresql:8.1PostgreSQL 8.1
cpe:/a:postgresql:postgresql:8.0.6PostgreSQL PostgreSQL 8.0.6
cpe:/a:postgresql:postgresql:8.0.4PostgreSQL PostgreSQL 8.0.4
cpe:/a:postgresql:postgresql:8.0.3PostgreSQL PostgreSQL 8.0.3
cpe:/a:postgresql:postgresql:7.4.12PostgreSQL PostgreSQL 7.4.12
cpe:/a:postgresql:postgresql:7.4.2PostgreSQL PostgreSQL 7.4.2
cpe:/a:postgresql:postgresql:8.0.1PostgreSQL PostgreSQL 8.0.1

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:9947PostgreSQL 8.1.x before 8.1.4, 8.0.x before 8.0.8, 7.4.x before 7.4.13, 7.3.x before 7.3.15, and earlier versions allows context-dependent a...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2314
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-2314
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200605-468
(官方数据源) CNNVD

- 其它链接及资源

http://archives.postgresql.org/pgsql-announce/2006-05/msg00010.php
(PATCH)  MLIST  [pgsql-announce] 20060523 Security Releases for All Active Versions
http://www.vupen.com/english/advisories/2006/1941
(UNKNOWN)  VUPEN  ADV-2006-1941
http://www.postgresql.org/docs/techdocs.50
(UNKNOWN)  CONFIRM  http://www.postgresql.org/docs/techdocs.50
http://xforce.iss.net/xforce/xfdb/26628
(UNKNOWN)  XF  postgresql-ascii-sql-injection(26628)
http://xforce.iss.net/xforce/xfdb/26627
(UNKNOWN)  XF  postgresql-multibyte-sql-injection(26627)
http://www.ubuntulinux.org/support/documentation/usn/usn-288-1
(UNKNOWN)  UBUNTU  USN-288-1
http://www.ubuntu.com/usn/usn-288-3
(UNKNOWN)  UBUNTU  USN-288-3
http://www.ubuntu.com/usn/usn-288-2
(UNKNOWN)  UBUNTU  USN-288-2
http://www.trustix.org/errata/2006/0032/
(UNKNOWN)  TRUSTIX  2006-0032
http://www.securityfocus.com/bid/18092
(UNKNOWN)  BID  18092
http://www.securityfocus.com/archive/1/archive/1/435161/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060524 rPSA-2006-0080-1 postgresql postgresql-server
http://www.securityfocus.com/archive/1/archive/1/435038/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060523 PostgreSQL security releases 8.1.4, 8.0.8, 7.4.13, 7.3.15
http://www.redhat.com/support/errata/RHSA-2006-0526.html
(UNKNOWN)  REDHAT  RHSA-2006:0526
http://www.osvdb.org/25731
(UNKNOWN)  OSVDB  25731
http://www.novell.com/linux/security/advisories/2006_21_sr.html
(UNKNOWN)  SUSE  SUSE-SR:2006:021
http://www.mandriva.com/security/advisories?name=MDKSA-2006:098
(UNKNOWN)  MANDRIVA  MDKSA-2006:098
http://www.debian.org/security/2006/dsa-1087
(UNKNOWN)  DEBIAN  DSA-1087
http://support.avaya.com/elmodocs2/security/ASA-2006-113.htm
(UNKNOWN)  CONFIRM  http://support.avaya.com/elmodocs2/security/ASA-2006-113.htm
http://securitytracker.com/id?1016142
(UNKNOWN)  SECTRACK  1016142
http://security.gentoo.org/glsa/glsa-200607-04.xml
(UNKNOWN)  GENTOO  GLSA-200607-04
http://secunia.com/advisories/21749
(UNKNOWN)  SECUNIA  21749
http://secunia.com/advisories/21001
(UNKNOWN)  SECUNIA  21001
http://secunia.com/advisories/20782
(UNKNOWN)  SECUNIA  20782
http://secunia.com/advisories/20653
(UNKNOWN)  SECUNIA  20653
http://secunia.com/advisories/20555
(UNKNOWN)  SECUNIA  20555
http://secunia.com/advisories/20503
(UNKNOWN)  SECUNIA  20503
http://secunia.com/advisories/20451
(UNKNOWN)  SECUNIA  20451
http://secunia.com/advisories/20435
(UNKNOWN)  SECUNIA  20435
http://secunia.com/advisories/20314
(UNKNOWN)  SECUNIA  20314
http://secunia.com/advisories/20232
(UNKNOWN)  SECUNIA  20232
http://secunia.com/advisories/20231
(UNKNOWN)  SECUNIA  20231
http://lists.suse.com/archive/suse-security-announce/2006-Jun/0002.html
(UNKNOWN)  SUSE  SUSE-SA:2006:030
ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc
(UNKNOWN)  SGI  20060602-01-U

- 漏洞信息

PostgreSQL 多个SQL注入漏洞
高危 SQL注入
2006-05-24 00:00:00 2006-05-25 00:00:00
远程  
        PostgreSQL是一款高级对象-关系型数据库管理系统,支持扩展的SQL标准子集。
        PostgreSQL中存在多个SQL注入漏洞:
        1 远程攻击者可以在SQL命令中嵌入特制字符串,使用无效编码的多字节字符绕过标准的字符转义模式,导致向数据库注入恶意的SQL命令。
        2 如果允许将0x5c(反斜线的ASCII码)用作多字节字符的结尾字节的话,则在处理这个多字节时将ASCII单引号"'"转义为"\'"的操作存在漏洞。这至少包括SJIS、BIG5、GBK、GB18030和UHC。如果在SQL命令中嵌入了不可信任字符,则在进行上述转换时存在SQL注入漏洞。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        Dovecot Dovecot 0.99.14
        Ubuntu dovecot-common_0.99.14-1ubuntu1.1_amd64.deb
        Ubuntu 5.10:
        http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-common_0 .99.14-1ubuntu1.1_amd64.deb
        Ubuntu dovecot-common_0.99.14-1ubuntu1.1_i386.deb
        Ubuntu 5.10:
        http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-common_0 .99.14-1ubuntu1.1_i386.deb
        Ubuntu dovecot-common_0.99.14-1ubuntu1.1_powerpc.deb
        Ubuntu 5.10:
        http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-common_0 .99.14-1ubuntu1.1_powerpc.deb
        Ubuntu dovecot-imapd_0.99.14-1ubuntu1.1_amd64.deb
        Ubuntu 5.10:
        http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-imapd_0. 99.14-1ubuntu1.1_amd64.deb
        Ubuntu dovecot-imapd_0.99.14-1ubuntu1.1_i386.deb
        Ubuntu 5.10:
        http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-imapd_0. 99.14-1ubuntu1.1_i386.deb
        Ubuntu dovecot-imapd_0.99.14-1ubuntu1.1_powerpc.deb
        Ubuntu 5.10:
        http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-imapd_0. 99.14-1ubuntu1.1_powerpc.deb
        Ubuntu dovecot-pop3d_0.99.14-1ubuntu1.1_amd64.deb
        Ubuntu 5.10:
        http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-pop3d_0. 99.14-1ubuntu1.1_amd64.deb
        Ubuntu dovecot-pop3d_0.99.14-1ubuntu1.1_i386.deb
        Ubuntu 5.10:
        http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-pop3d_0. 99.14-1ubuntu1.1_i386.deb
        Ubuntu dovecot-pop3d_0.99.14-1ubuntu1.1_powerpc.deb
        Ubuntu 5.10:
        http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot-pop3d_0. 99.14-1ubuntu1.1_powerpc.deb
        Ubuntu dovecot_0.99.14-1ubuntu1.1_all.deb
        Ubuntu 5.10:
        http://security.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot_0.99.14- 1ubuntu1.1_all.deb
        Wietse Venema Postfix 2.1.5
        Ubuntu postfix-dev_2.1.5-9ubuntu3.1_all.deb
        Ubuntu 5.04:
        http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-dev_2.1. 5-9ubuntu3.1_all.deb
        Ubuntu postfix-doc_2.1.5-9ubuntu3.1_all.deb
        Ubuntu 5.04:
        http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-doc_2.1. 5-9ubuntu3.1_all.deb
        Ubuntu postfix-ldap_2.1.5-9ubuntu3.1_amd64.deb
        Ubuntu 5.04:
        http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-ldap_2.1 .5-9ubuntu3.1_amd64.deb
        Ubuntu postfix-ldap_2.1.5-9ubuntu3.1_i386.deb
        Ubuntu 5.04:
        http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-ldap_2.1 .5-9ubuntu3.1_i386.deb
        Ubuntu postfix-ldap_2.1.5-9ubuntu3.1_powerpc.deb
        Ubuntu 5.04:
        http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-ldap_2.1 .5-9ubuntu3.1_powerpc.deb
        Ubuntu postfix-mysql_2.1.5-9ubuntu3.1_amd64.deb
        Ubuntu 5.04:
        http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-mysql_2. 1.5-9ubuntu3.1_amd64.deb
        Ubuntu postfix-mysql_2.1.5-9ubuntu3.1_i386.deb
        Ubuntu 5.04:
        http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-mysql_2. 1.5-9ubuntu3.1_i386.deb
        Ubuntu postfix-mysql_2.1.5-9ubuntu3.1_powerpc.deb
        Ubuntu 5.04:
        http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-mysql_2. 1.5-9ubuntu3.1_powerpc.deb
        

- 漏洞信息 (F47016)

Debian Linux Security Advisory 1087-1 (PacketStormID:F47016)
2006-06-05 00:00:00
Debian  debian.org
advisory
linux,debian
CVE-2006-2313,CVE-2006-2314
[点击下载]

Debian Security Advisory 1087-1 - Several encoding problems have been discovered in PostgreSQL, a popular SQL database.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 1087-1                    security@debian.org
http://www.debian.org/security/                             Martin Schulze
June 3rd, 2006                          http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : postgresql
Vulnerability  : programming error
Problem type   : remote
Debian-specific: no
CVE IDs        : CVE-2006-2313 CVE-2006-2314

Several encoding problems have been discovered in PostgreSQL, a
popular SQL database.  The Common Vulnerabilities and Exposures
project identifies the following problems:

CVE-2006-2313

    Akio Ishida and Yasuo Ohgaki discovered a weakness in the handling
    of invalidly-encoded multibyte text data which could allow an
    attacker to inject arbitrary SQL commands.

CVE-2006-2314

    A similar problem exists in client-side encodings (such as SJIS,
    BIG5, GBK, GB18030, and UHC) which contain valid multibyte
    characters that end with the backslash character.  An attacker
    could supply a specially crafted byte sequence that is able to
    inject arbitrary SQL commands.

    This issue does not affect you if you only use single-byte (like
    SQL_ASCII or the ISO-8859-X family) or unaffected multibyte (like
    UTF-8) encodings.

    psycopg and python-pgsql use the old encoding for binary data and
    may have to be updated.

The old stable distribution (woody) is affected by these problems but
we're unable to correct the package.

For the stable distribution (sarge) these problems have been fixed in
version 7.4.7-6sarge2.

For the unstable distribution (sid) these problems have been fixed in
version 7.4.13-1.

We recommend that you upgrade your postgresql packages.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given at the end of this advisory:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/p/postgresql/postgresql_7.4.7-6sarge2.dsc
      Size/MD5 checksum:      985 78d63a976c27999c86bbd57f70eae80d
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql_7.4.7-6sarge2.diff.gz
      Size/MD5 checksum:   189611 577fb231aac4f86692e935b6a30eb1f4
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql_7.4.7.orig.tar.gz
      Size/MD5 checksum:  9952102 d193c58aef02a745e8657c48038587ac

  Architecture independent components:

    http://security.debian.org/pool/updates/main/p/postgresql/postgresql-doc_7.4.7-6sarge2_all.deb
      Size/MD5 checksum:  2266882 86068a0b0bd5f3353746555933d29317

  Alpha architecture:

    http://security.debian.org/pool/updates/main/p/postgresql/libecpg-dev_7.4.7-6sarge2_alpha.deb
      Size/MD5 checksum:   239980 bb173b640c9f206c320d20b554d724fa
    http://security.debian.org/pool/updates/main/p/postgresql/libecpg4_7.4.7-6sarge2_alpha.deb
      Size/MD5 checksum:   104826 0d4a8d8aea91799bc70617f9e47b5b29
    http://security.debian.org/pool/updates/main/p/postgresql/libpgtcl_7.4.7-6sarge2_alpha.deb
      Size/MD5 checksum:    82408 f4a3dad48412573e5b993c4d9e7400f1
    http://security.debian.org/pool/updates/main/p/postgresql/libpgtcl-dev_7.4.7-6sarge2_alpha.deb
      Size/MD5 checksum:    61972 7cc403fea81613636d180358568638ca
    http://security.debian.org/pool/updates/main/p/postgresql/libpq3_7.4.7-6sarge2_alpha.deb
      Size/MD5 checksum:   139496 bede365b3e3505f79cb734747744fd5e
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql_7.4.7-6sarge2_alpha.deb
      Size/MD5 checksum:  4153162 86740fcfb886861702c8bccbcfb7a8be
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql-client_7.4.7-6sarge2_alpha.deb
      Size/MD5 checksum:   614270 16108bc1a5cc9d7d51337597e2f5090c
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql-contrib_7.4.7-6sarge2_alpha.deb
      Size/MD5 checksum:   701704 de550242e2d5cbbf0d9c24aad75a4977
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql-dev_7.4.7-6sarge2_alpha.deb
      Size/MD5 checksum:   546150 d9c95cc8ac6e21509b13640d0589c46c

  AMD64 architecture:

    http://security.debian.org/pool/updates/main/p/postgresql/libecpg-dev_7.4.7-6sarge2_amd64.deb
      Size/MD5 checksum:   210208 602e081a5b8ef164d0d7114cfbb002e2
    http://security.debian.org/pool/updates/main/p/postgresql/libecpg4_7.4.7-6sarge2_amd64.deb
      Size/MD5 checksum:    96442 ecdcbc5b59750b9871d49e3319a18fb8
    http://security.debian.org/pool/updates/main/p/postgresql/libpgtcl_7.4.7-6sarge2_amd64.deb
      Size/MD5 checksum:    79380 ca54542f754ac5da8c992f5889c12cc9
    http://security.debian.org/pool/updates/main/p/postgresql/libpgtcl-dev_7.4.7-6sarge2_amd64.deb
      Size/MD5 checksum:    56212 364aaa1ac5a22e12262b90314f060d33
    http://security.debian.org/pool/updates/main/p/postgresql/libpq3_7.4.7-6sarge2_amd64.deb
      Size/MD5 checksum:   131638 82fcd52b9cb9c93afb1e9545df89ee28
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql_7.4.7-6sarge2_amd64.deb
      Size/MD5 checksum:  3887452 f408a28bc585b4f98e72e343813316be
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql-client_7.4.7-6sarge2_amd64.deb
      Size/MD5 checksum:   559516 2b31c9a4fc43ab7ca0d9dd2f55dd1bb9
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql-contrib_7.4.7-6sarge2_amd64.deb
      Size/MD5 checksum:   654962 0b5970688a0f4ed4476ea80196b3e33d
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql-dev_7.4.7-6sarge2_amd64.deb
      Size/MD5 checksum:   519740 b291ff79aa9dcf4c94b4f544222b6e3c

  ARM architecture:

    http://security.debian.org/pool/updates/main/p/postgresql/libecpg-dev_7.4.7-6sarge2_arm.deb
      Size/MD5 checksum:   216872 60267ccd42ebc905fbed60faf15ce7c8
    http://security.debian.org/pool/updates/main/p/postgresql/libecpg4_7.4.7-6sarge2_arm.deb
      Size/MD5 checksum:    92170 6f866dbf0695c4857d73dbd9c538caa7
    http://security.debian.org/pool/updates/main/p/postgresql/libpgtcl_7.4.7-6sarge2_arm.deb
      Size/MD5 checksum:    76290 53279156767dd6b03ebde6a1a7a6e9d5
    http://security.debian.org/pool/updates/main/p/postgresql/libpgtcl-dev_7.4.7-6sarge2_arm.deb
      Size/MD5 checksum:    56338 14809b9f1149cc9a09b2b7f65efffd07
    http://security.debian.org/pool/updates/main/p/postgresql/libpq3_7.4.7-6sarge2_arm.deb
      Size/MD5 checksum:   124098 72f5fa7ae580925a88a2d3dd8fc96c3d
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql_7.4.7-6sarge2_arm.deb
      Size/MD5 checksum:  3789942 b819ecda4f08a2f321942e6efd760e35
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql-client_7.4.7-6sarge2_arm.deb
      Size/MD5 checksum:   534538 b1cd2927aaf7a59ebe9274e9d88beff9
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql-contrib_7.4.7-6sarge2_arm.deb
      Size/MD5 checksum:   628216 a94c9d9207b560b6eed5fd823bdd5406
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql-dev_7.4.7-6sarge2_arm.deb
      Size/MD5 checksum:   518454 db9f0c0c6ab0c0c3a504c5a1faf93d54

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/p/postgresql/libecpg-dev_7.4.7-6sarge2_i386.deb
      Size/MD5 checksum:   207204 aafafd90bea915cfce42e4cc8997a7ae
    http://security.debian.org/pool/updates/main/p/postgresql/libecpg4_7.4.7-6sarge2_i386.deb
      Size/MD5 checksum:    95146 fbccb71b54ddae5b4f0100262e546edd
    http://security.debian.org/pool/updates/main/p/postgresql/libpgtcl_7.4.7-6sarge2_i386.deb
      Size/MD5 checksum:    78032 c2199f8932f9af670103bae577da7928
    http://security.debian.org/pool/updates/main/p/postgresql/libpgtcl-dev_7.4.7-6sarge2_i386.deb
      Size/MD5 checksum:    55678 ba9771127582d3c4d041d0ebd54714f8
    http://security.debian.org/pool/updates/main/p/postgresql/libpq3_7.4.7-6sarge2_i386.deb
      Size/MD5 checksum:   128310 fcdcfa9995f3929c4af97fa75540fdf8
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql_7.4.7-6sarge2_i386.deb
      Size/MD5 checksum:  3799030 0d851c1ad83ba723ca81009464c69f71
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql-client_7.4.7-6sarge2_i386.deb
      Size/MD5 checksum:   539660 c3511e4e1935e5e741e630b33828492f
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql-contrib_7.4.7-6sarge2_i386.deb
      Size/MD5 checksum:   625940 32bb7a6139270dd119f72a7b708a6c54
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql-dev_7.4.7-6sarge2_i386.deb
      Size/MD5 checksum:   516050 9aa8818dec80c8830fde3b0d6849d310

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/p/postgresql/libecpg-dev_7.4.7-6sarge2_ia64.deb
      Size/MD5 checksum:   250406 02e0cd73738b871e12fe07d435f502e8
    http://security.debian.org/pool/updates/main/p/postgresql/libecpg4_7.4.7-6sarge2_ia64.deb
      Size/MD5 checksum:   117496 0b12feda47694da718abaa8b82e3a7df
    http://security.debian.org/pool/updates/main/p/postgresql/libpgtcl_7.4.7-6sarge2_ia64.deb
      Size/MD5 checksum:    91804 c75fd48f53fa84033593c5000c4e2ba1
    http://security.debian.org/pool/updates/main/p/postgresql/libpgtcl-dev_7.4.7-6sarge2_ia64.deb
      Size/MD5 checksum:    60582 c81d60f2b9fcafc17bf2c890f62a67af
    http://security.debian.org/pool/updates/main/p/postgresql/libpq3_7.4.7-6sarge2_ia64.deb
      Size/MD5 checksum:   152570 657268cc59f43720a4fbcd7401f68a51
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql_7.4.7-6sarge2_ia64.deb
      Size/MD5 checksum:  4408476 6b9c54e4e402f7f2dd0bab017b53b066
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql-client_7.4.7-6sarge2_ia64.deb
      Size/MD5 checksum:   682300 919925ab2e1e3f0214223ec4d557198f
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql-contrib_7.4.7-6sarge2_ia64.deb
      Size/MD5 checksum:   776054 17a52e7ee887815ea0eca17db214e143
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql-dev_7.4.7-6sarge2_ia64.deb
      Size/MD5 checksum:   543558 304d71b16b2de34209431a6e4f5f47b4

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/p/postgresql/libecpg-dev_7.4.7-6sarge2_hppa.deb
      Size/MD5 checksum:   217744 7ea61b426c2ead22a87d8e6b2b8cbc06
    http://security.debian.org/pool/updates/main/p/postgresql/libecpg4_7.4.7-6sarge2_hppa.deb
      Size/MD5 checksum:   104378 cb8adb9c1dd2bc415a6157fa12f928e5
    http://security.debian.org/pool/updates/main/p/postgresql/libpgtcl_7.4.7-6sarge2_hppa.deb
      Size/MD5 checksum:    83740 3799d1cfececc128d9a6a790c08a86c7
    http://security.debian.org/pool/updates/main/p/postgresql/libpgtcl-dev_7.4.7-6sarge2_hppa.deb
      Size/MD5 checksum:    58682 3caab961a85db146b0d37f982af37622
    http://security.debian.org/pool/updates/main/p/postgresql/libpq3_7.4.7-6sarge2_hppa.deb
      Size/MD5 checksum:   134686 5a730cd2793948c69aacb82d00124259
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql_7.4.7-6sarge2_hppa.deb
      Size/MD5 checksum:  4263326 56aa2f4f1caab2fddf15b8c0c960c426
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql-client_7.4.7-6sarge2_hppa.deb
      Size/MD5 checksum:   572462 2989c44d3ed16aff10af1bbdfee973f8
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql-contrib_7.4.7-6sarge2_hppa.deb
      Size/MD5 checksum:   686150 ad186c53d5cf30ec79bd5f7a8de97a7c
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql-dev_7.4.7-6sarge2_hppa.deb
      Size/MD5 checksum:   523900 eb948f532e5cfdebe504925a73103c9d

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/p/postgresql/libecpg-dev_7.4.7-6sarge2_m68k.deb
      Size/MD5 checksum:   194254 60cb0f51cdb1e8c270bf5092b8d8255c
    http://security.debian.org/pool/updates/main/p/postgresql/libecpg4_7.4.7-6sarge2_m68k.deb
      Size/MD5 checksum:    89926 557536dec7b52d56abd80da0e3395204
    http://security.debian.org/pool/updates/main/p/postgresql/libpgtcl_7.4.7-6sarge2_m68k.deb
      Size/MD5 checksum:    76946 8d5b8aaaad2faef72647dab6bf74a706
    http://security.debian.org/pool/updates/main/p/postgresql/libpgtcl-dev_7.4.7-6sarge2_m68k.deb
      Size/MD5 checksum:    53920 d8a7c7dfde0b9848c9b820b1b021013b
    http://security.debian.org/pool/updates/main/p/postgresql/libpq3_7.4.7-6sarge2_m68k.deb
      Size/MD5 checksum:   125348 e2a9707ad1ac5f7fe1c1f2455242bc2c
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql_7.4.7-6sarge2_m68k.deb
      Size/MD5 checksum:  3974176 da72953d869784679784c9753972128f
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql-client_7.4.7-6sarge2_m68k.deb
      Size/MD5 checksum:   510460 0c3be055f6a3e09377c5669e25ee6cc3
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql-contrib_7.4.7-6sarge2_m68k.deb
      Size/MD5 checksum:   608894 52181b4b31ca796c2a67737706c2d732
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql-dev_7.4.7-6sarge2_m68k.deb
      Size/MD5 checksum:   507366 b47589dc8e2cba5f2484136ae1360bd8

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/p/postgresql/libecpg-dev_7.4.7-6sarge2_mips.deb
      Size/MD5 checksum:   209612 24ecb0017cc2d0213c9ae14def963f7c
    http://security.debian.org/pool/updates/main/p/postgresql/libecpg4_7.4.7-6sarge2_mips.deb
      Size/MD5 checksum:    95740 7bc16022786a15ce296cc450bad14690
    http://security.debian.org/pool/updates/main/p/postgresql/libpgtcl_7.4.7-6sarge2_mips.deb
      Size/MD5 checksum:    80856 4ae6337bf3f0749e5646398025b4ca3a
    http://security.debian.org/pool/updates/main/p/postgresql/libpgtcl-dev_7.4.7-6sarge2_mips.deb
      Size/MD5 checksum:    56260 32e7db2cc80977c8202f4dd11e4d37c0
    http://security.debian.org/pool/updates/main/p/postgresql/libpq3_7.4.7-6sarge2_mips.deb
      Size/MD5 checksum:   128346 19627a5e0dab29be81b092ef9a064f1c
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql_7.4.7-6sarge2_mips.deb
      Size/MD5 checksum:  4171356 e97e1b50aa6ce9f1b3963d9ab20eeacc
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql-client_7.4.7-6sarge2_mips.deb
      Size/MD5 checksum:   582144 804d77b5e1089b5b39e57eb228836aca
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql-contrib_7.4.7-6sarge2_mips.deb
      Size/MD5 checksum:   641800 4b006574dbeda3bcedc514ca12433b10
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql-dev_7.4.7-6sarge2_mips.deb
      Size/MD5 checksum:   521302 8d1b8b6bc9bc640761909527c425083a

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/p/postgresql/libecpg-dev_7.4.7-6sarge2_mipsel.deb
      Size/MD5 checksum:   207620 1b974ad276e845a8b9da8afb88b20118
    http://security.debian.org/pool/updates/main/p/postgresql/libecpg4_7.4.7-6sarge2_mipsel.deb
      Size/MD5 checksum:    95932 06b9e5d8fd2e82c622febe7faf7b2be7
    http://security.debian.org/pool/updates/main/p/postgresql/libpgtcl_7.4.7-6sarge2_mipsel.deb
      Size/MD5 checksum:    80612 7a2d7bbd54b8f08aa09c2cd307d3d2be
    http://security.debian.org/pool/updates/main/p/postgresql/libpgtcl-dev_7.4.7-6sarge2_mipsel.deb
      Size/MD5 checksum:    56322 22475b9bc5de36f15ad8560795455133
    http://security.debian.org/pool/updates/main/p/postgresql/libpq3_7.4.7-6sarge2_mipsel.deb
      Size/MD5 checksum:   128422 f6fbc5968a69601bcf94d71ad0f88532
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql_7.4.7-6sarge2_mipsel.deb
      Size/MD5 checksum:  3862226 e4424c77620f0c30beb7d8ac0e253d9f
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql-client_7.4.7-6sarge2_mipsel.deb
      Size/MD5 checksum:   581426 ed5a9b2a615bdfcc7036287667502038
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql-contrib_7.4.7-6sarge2_mipsel.deb
      Size/MD5 checksum:   641240 dc49d2bcf81a25280664c73b1af8797b
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql-dev_7.4.7-6sarge2_mipsel.deb
      Size/MD5 checksum:   521720 5ff500cb5542403582240c7e37bbcdda

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/p/postgresql/libecpg-dev_7.4.7-6sarge2_powerpc.deb
      Size/MD5 checksum:   210904 48e1dd207b4b025e80b35406d75b43ee
    http://security.debian.org/pool/updates/main/p/postgresql/libecpg4_7.4.7-6sarge2_powerpc.deb
      Size/MD5 checksum:   100428 901be88d71fc0e06ccf3e50fb4151b93
    http://security.debian.org/pool/updates/main/p/postgresql/libpgtcl_7.4.7-6sarge2_powerpc.deb
      Size/MD5 checksum:    84596 72fbac10fd10eedcc4ef1673e5ad57b2
    http://security.debian.org/pool/updates/main/p/postgresql/libpgtcl-dev_7.4.7-6sarge2_powerpc.deb
      Size/MD5 checksum:    55326 96fcce34e09b75e683c09e63d94b0ac2
    http://security.debian.org/pool/updates/main/p/postgresql/libpq3_7.4.7-6sarge2_powerpc.deb
      Size/MD5 checksum:   129898 6467b522f8bcf577a5a5eac47e695e5f
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql_7.4.7-6sarge2_powerpc.deb
      Size/MD5 checksum:  4203052 1f019762641079d46b162b4ad2837458
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql-client_7.4.7-6sarge2_powerpc.deb
      Size/MD5 checksum:   565430 a305cd9acfcec0d648edb56eaae2f605
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql-contrib_7.4.7-6sarge2_powerpc.deb
      Size/MD5 checksum:   686040 3d34c6d9faf50a6c88c736364895cbdf
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql-dev_7.4.7-6sarge2_powerpc.deb
      Size/MD5 checksum:   516676 c2e91f20faa7669ab94fae166f94cac5

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/p/postgresql/libecpg-dev_7.4.7-6sarge2_s390.deb
      Size/MD5 checksum:   208296 1ceaec0962943f05b7cb930c5a8ec5f0
    http://security.debian.org/pool/updates/main/p/postgresql/libecpg4_7.4.7-6sarge2_s390.deb
      Size/MD5 checksum:    97814 73b521d57581888ffa97f4c519aa2b78
    http://security.debian.org/pool/updates/main/p/postgresql/libpgtcl_7.4.7-6sarge2_s390.deb
      Size/MD5 checksum:    80456 704e9ef41e3f89e610f7400c998ce88c
    http://security.debian.org/pool/updates/main/p/postgresql/libpgtcl-dev_7.4.7-6sarge2_s390.deb
      Size/MD5 checksum:    56994 b135a1197a5b47a4070a07ffceb33348
    http://security.debian.org/pool/updates/main/p/postgresql/libpq3_7.4.7-6sarge2_s390.deb
      Size/MD5 checksum:   133966 f80f2bfb7a971fd9ff4f3266c9fdddcd
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql_7.4.7-6sarge2_s390.deb
      Size/MD5 checksum:  4161698 8dac213b26c2f64b394ead91cf796c8e
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql-client_7.4.7-6sarge2_s390.deb
      Size/MD5 checksum:   549568 a82366bd7a49ca2e2c3f84a0f99b61b2
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql-contrib_7.4.7-6sarge2_s390.deb
      Size/MD5 checksum:   665482 6d7faf109031c6f295966e65bd69ed79
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql-dev_7.4.7-6sarge2_s390.deb
      Size/MD5 checksum:   520664 3ebbbcd84b599632d3b74a6aa5cfbd9e

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/p/postgresql/libecpg-dev_7.4.7-6sarge2_sparc.deb
      Size/MD5 checksum:   205870 9fe5eac55d9ecb77cde27081e43fa2e2
    http://security.debian.org/pool/updates/main/p/postgresql/libecpg4_7.4.7-6sarge2_sparc.deb
      Size/MD5 checksum:    93606 1ef27ddd79e25a9de9f65673076ccbed
    http://security.debian.org/pool/updates/main/p/postgresql/libpgtcl_7.4.7-6sarge2_sparc.deb
      Size/MD5 checksum:    77926 525d22dd799578af00d5ee3e09718dbd
    http://security.debian.org/pool/updates/main/p/postgresql/libpgtcl-dev_7.4.7-6sarge2_sparc.deb
      Size/MD5 checksum:    56150 07daedfabe9931672c7fced5ef515708
    http://security.debian.org/pool/updates/main/p/postgresql/libpq3_7.4.7-6sarge2_sparc.deb
      Size/MD5 checksum:   127594 e488f86dcbce2df62c3dbfe56766d1c2
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql_7.4.7-6sarge2_sparc.deb
      Size/MD5 checksum:  4091222 6c3cbbb9965d35a5813ea78abac52645
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql-client_7.4.7-6sarge2_sparc.deb
      Size/MD5 checksum:   535876 f914be88ee8da6b67cc3af31db4ef42b
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql-contrib_7.4.7-6sarge2_sparc.deb
      Size/MD5 checksum:   633208 f23620f4d6708b1946e85349372e3048
    http://security.debian.org/pool/updates/main/p/postgresql/postgresql-dev_7.4.7-6sarge2_sparc.deb
      Size/MD5 checksum:   514344 6d8417121070e1faa09936e6ac9b943f


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFEgT+lW5ql+IAeqTIRArfKAKCMOKzZa8IIZt+J/BxwuJBaoNgr4wCfRhTM
WBMSduHAHsW4XT7jGd/g0mg=
=lrI2
-----END PGP SIGNATURE-----

    

- 漏洞信息

25731
PostgreSQL Single Quote Escaping Filter Bypass
Remote / Network Access Input Manipulation
Loss of Confidentiality, Loss of Integrity
Vendor Verified

- 漏洞描述

PostgreSQL contains a flaw that may allow a malicious user to bypass security restrictions and execute arbitrary SQL commands. The issue is triggered due to an error when escaping ASCII single quote "'" characters (by turning them into "\'") and operating in multibyte encodings (e.g. SJIS, BIG5, GBK, GB18030, or UHC) that allow using the "0x5c" ASCII code (backslash) as the trailing byte of a multibyte character. It is possible that the flaw may allow SQL injection attacks resulting in a loss of confidentiality and integrity.

- 时间线

2006-05-24 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 7.3.15, 7.4.13, 8.0.8, 8.1.4 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站