Access Restriction Bypass Affecting postgresql-docs package, versions *
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL6-POSTGRESQLDOCS-1326505
- published 26 Jul 2021
- disclosed 17 May 2010
Introduced: 17 May 2010
CVE-2010-1170 Open this link in a new tabHow to fix?
There is no fixed version for RHEL:6 postgresql-docs.
NVD Description
Note: Versions mentioned in the description apply only to the upstream postgresql-docs package and not the postgresql-docs package as distributed by RHEL.
See How to fix? for RHEL:6 relevant fixed versions and status.
The PL/Tcl implementation in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2 loads Tcl code from the pltcl_modules table regardless of the table's ownership and permissions, which allows remote authenticated users, with database-creation privileges, to execute arbitrary Tcl code by creating this table and inserting a crafted Tcl script.
References
- http://www.securityfocus.com/bid/40215
- https://bugzilla.redhat.com/show_bug.cgi?id=583072
- http://www.postgresql.org/about/news.1203
- http://www.postgresql.org/docs/current/static/release-7-4-29.html
- http://www.postgresql.org/docs/current/static/release-8-0-25.html
- http://www.postgresql.org/docs/current/static/release-8-1-21.html
- http://www.postgresql.org/docs/current/static/release-8-2-17.html
- http://www.postgresql.org/docs/current/static/release-8-3-11.html
- http://www.postgresql.org/docs/current/static/release-8-4-4.html
- http://www.postgresql.org/support/security
- https://access.redhat.com/security/cve/CVE-2010-1170
- http://www.debian.org/security/2010/dsa-2051
- http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041559.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041579.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041591.html
- http://marc.info/?l=bugtraq&m=134124585221119&w=2
- http://www.mandriva.com/security/advisories?name=MDVSA-2010:103
- http://www.openwall.com/lists/oss-security/2010/05/20/5
- http://osvdb.org/64757
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10510
- http://www.redhat.com/support/errata/RHSA-2010-0427.html
- http://www.redhat.com/support/errata/RHSA-2010-0428.html
- http://www.redhat.com/support/errata/RHSA-2010-0429.html
- http://www.redhat.com/support/errata/RHSA-2010-0430.html
- http://www.securitytracker.com/id?1023987
- http://secunia.com/advisories/39815
- http://secunia.com/advisories/39820
- http://secunia.com/advisories/39845
- http://secunia.com/advisories/39898
- http://secunia.com/advisories/39939
- http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
- http://www.vupen.com/english/advisories/2010/1167
- http://www.vupen.com/english/advisories/2010/1182
- http://www.vupen.com/english/advisories/2010/1197
- http://www.vupen.com/english/advisories/2010/1198
- http://www.vupen.com/english/advisories/2010/1207
- http://www.vupen.com/english/advisories/2010/1221