SQL Injection Affecting postgresql-docs package, versions <0:8.4.11-1.el6_2
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL6-POSTGRESQLDOCS-1441811
- published 26 Jul 2021
- disclosed 27 Feb 2012
Introduced: 27 Feb 2012
CVE-2012-0868 Open this link in a new tabHow to fix?
Upgrade RHEL:6 postgresql-docs to version 0:8.4.11-1.el6_2 or higher.
This issue was patched in RHSA-2012:0678.
NVD Description
Note: Versions mentioned in the description apply only to the upstream postgresql-docs package and not the postgresql-docs package as distributed by RHEL.
See How to fix? for RHEL:6 relevant fixed versions and status.
CRLF injection vulnerability in pg_dump in PostgreSQL 8.3.x before 8.3.18, 8.4.x before 8.4.11, 9.0.x before 9.0.7, and 9.1.x before 9.1.3 allows user-assisted remote attackers to execute arbitrary SQL commands via a crafted file containing object names with newlines, which are inserted into an SQL script that is used when the database is restored.
References
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://www.postgresql.org/about/news/1377/
- http://www.postgresql.org/docs/8.3/static/release-8-3-18.html
- http://www.postgresql.org/docs/8.4/static/release-8-4-11.html
- http://www.postgresql.org/docs/9.0/static/release-9-0-7.html
- http://www.postgresql.org/docs/9.1/static/release-9-1-3.html
- https://access.redhat.com/security/cve/CVE-2012-0868
- http://www.debian.org/security/2012/dsa-2418
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:026
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:027
- http://rhn.redhat.com/errata/RHSA-2012-0677.html
- http://rhn.redhat.com/errata/RHSA-2012-0678.html
- https://access.redhat.com/errata/RHSA-2012:0678
- http://secunia.com/advisories/49272
- http://secunia.com/advisories/49273
- http://lists.opensuse.org/opensuse-updates/2012-09/msg00060.html