First published: Thu Dec 02 1999(Updated: )
Insecure directory permissions in RPM distribution for PostgreSQL allows local users to gain privileges by reading a plaintext password file.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PostgreSQL Common | =6.3.2 | |
PostgreSQL Common | =6.5.3 | |
PostgreSQL Common | =6.5.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-0862 has a medium severity rating due to the potential for local users to gain unauthorized privileges.
To fix CVE-1999-0862, ensure that directory permissions for PostgreSQL are correctly set to prevent unauthorized access to sensitive files.
CVE-1999-0862 affects local users of specific versions of PostgreSQL, particularly versions 6.3.2, 6.5.3, and 6.5.3.1.
The potential impacts of CVE-1999-0862 include unauthorized access to plaintext passwords and increased risk of privilege escalation.
Yes, CVE-1999-0862 is considered a historical vulnerability, documented back in 1999, but it highlights the importance of secure file permissions.