Note: This is an archival copy of Security Sun Alert 270408 as previously published on http://sunsolve.sun.com.|
Latest version of this security advisory is available from http://support.oracle.com as Sun Alert 1021076.1.
6879165, 6879166, 6784052, 6888545
Solaris 10 Operating System
Date of Workaround Release
Date of Resolved Release
Security vulnerabilities affecting the PostgreSQL software:
Security vulnerabilities affecting the PostgreSQL software shipped with Solaris may allow an authenticated PostgreSQL user to cause a denial of service (DoS) to the PostgreSQL server by "re-LOAD-ing" libraries from a certain plugins directory. However, the PostgreSQL versions shipped with Solaris do not include any plugins. In addition, an issue with the privileges for RESET ROLE and RESET SESSION AUTHORIZATION operations may allow any authenticated users to gain extra privileges.
These issues are described in the following documents:
Official PostgreSQL announcement at: http://www.postgresql.org/about/news.1135
CVE-2009-3229 at: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3229
CVE-2009-3230 at: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3230
Note: PostgreSQL is not compiled with LDAP support on Solaris. Solaris is not affected with CVE-2009-3231.
2. Contributing Factors
This issue can occur in the following releases:
Note 2: A user exploiting this vulnerability must have an account on the PostgreSQL server.
Note 3: The issues described in CVE-2009-3229 affects PostgreSQL versions 8.2.x prior to 8.2.14, 8.3.x prior to 8.3.8, and versions 8.4.x prior to 8.4.1.
Note 4: The issues described in CVE-2009-3230 affects PostgreSQL 7.4.x prior to 7.4.26, 8.0.x prior to 8.0.22, 8.1.x prior to 8.1.18, 8.2.x prior to 8.2.14, 8.3.x prior to 8.3.8, and versions 8.4.x prior to 8.4.1.
Note 5: PostgreSQL 8.1 (SUNWpostgr), 8.2 (packages beginning with SUNWpostgr-82) and 8.3 (packages beginning with SUNWpostgr-83) can be installed at the same time and are separately impacted by these vulnerabilities.
Note 6: Only systems with PostgreSQL plugins installed are impacted by CVE-2009-3229 issue.
To determine if there are any plugins installed, execute the following command:
for PostgreSQL 8.2:
$ ls -l /usr/postgres/8.2/lib/pluginsfor PostgreSQL 8.3:
$ ls -l /usr/postgres/8.3/lib/pluginsTo determine if a version of PostgreSQL is installed, the following command can be used:
$ pkginfo | grep SUNWpostgrTo determine if PostgreSQL is running on a server, the following command can be run as the user "postgres" (or the "root" user):
for PostgreSQL 8.1:
$ pg_ctl status -D /var/lib/pgsql/data/for PostgreSQL 8.2:
$ /usr/postgres/8.2/bin/pg_ctl status -D /var/postgres/8.2/data/for PostgreSQL 8.3:
$ /usr/postgres/8.3/bin/pg_ctl status -D /var/postgres/8.3/data/or (where applicable):
$ svcs -a | grep postgresql3. Symptoms
If the described issue has been exploited to cause a Denial of Service (DoS), the postgres(1) process may crash, potentially leaving a core file.
There is no workaround for this issues. Please see the Resolution section below.
This issue is addressed in the following releases:
For more information on Security Sun Alerts, see 1009886.1.
Copyright 2000-2009 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, CA 95054 U.S.A. All rights reserved.
02-Nov-2009: Updated Contributing Factors and Resolution sections. Resolved.
This solution has no attachment