Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

DB:POSTGRESQL:SET-ROLE-BYPASS

Severity

Major

Recommended

Yes

Category

DB

Keywords

PostgreSQL Database SET ROLE Security Bypass

Release Date

2015/06/12

Update Number

2504

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

DB: PostgreSQL Database SET ROLE Security Bypass


A policy bypass vulnerability has been found in PostgreSQL database server. The vulnerability is due to a design weakness when granting a role without ADMIN OPTION. A remote attacker can exploit the vulnerability to cause a policy bypass allowing execution of a security-restricted operation or a SECURITY DEFINER function.

Extended Description

PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 does not properly enforce the ADMIN OPTION restriction, which allows remote authenticated members of a role to add or remove arbitrary users to that role by calling the SET ROLE command before the associated GRANT command.

Affected Products

  • Postgresql postgresql 8.4.1
  • Postgresql postgresql 8.4.10
  • Postgresql postgresql 8.4.11
  • Postgresql postgresql 8.4.12
  • Postgresql postgresql 8.4.13
  • Postgresql postgresql 8.4.14
  • Postgresql postgresql 8.4.15
  • Postgresql postgresql 8.4.16
  • Postgresql postgresql 8.4.17
  • Postgresql postgresql 8.4.18
  • Postgresql postgresql 8.4.19
  • Postgresql postgresql 8.4.2
  • Postgresql postgresql 8.4.3
  • Postgresql postgresql 8.4.4
  • Postgresql postgresql 8.4.5
  • Postgresql postgresql 8.4.6
  • Postgresql postgresql 8.4.7
  • Postgresql postgresql 8.4.8
  • Postgresql postgresql 8.4.9
  • Postgresql postgresql 9.0
  • Postgresql postgresql 9.0.1
  • Postgresql postgresql 9.0.10
  • Postgresql postgresql 9.0.11
  • Postgresql postgresql 9.0.12
  • Postgresql postgresql 9.0.13
  • Postgresql postgresql 9.0.14
  • Postgresql postgresql 9.0.15
  • Postgresql postgresql 9.0.2
  • Postgresql postgresql 9.0.3
  • Postgresql postgresql 9.0.4
  • Postgresql postgresql 9.0.5
  • Postgresql postgresql 9.0.6
  • Postgresql postgresql 9.0.7
  • Postgresql postgresql 9.0.8
  • Postgresql postgresql 9.0.9
  • Postgresql postgresql 9.1
  • Postgresql postgresql 9.1.1
  • Postgresql postgresql 9.1.10
  • Postgresql postgresql 9.1.11
  • Postgresql postgresql 9.1.2
  • Postgresql postgresql 9.1.3
  • Postgresql postgresql 9.1.4
  • Postgresql postgresql 9.1.5
  • Postgresql postgresql 9.1.6
  • Postgresql postgresql 9.1.7
  • Postgresql postgresql 9.1.8
  • Postgresql postgresql 9.1.9
  • Postgresql postgresql 9.2
  • Postgresql postgresql 9.2.1
  • Postgresql postgresql 9.2.2
  • Postgresql postgresql 9.2.3
  • Postgresql postgresql 9.2.4
  • Postgresql postgresql 9.2.5
  • Postgresql postgresql 9.2.6
  • Postgresql postgresql 9.3
  • Postgresql postgresql 9.3.1
  • Postgresql postgresql 9.3.2

References

  • CVE: CVE-2014-0060

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out