First published: Tue Jun 19 2007(Updated: )
PostgreSQL 8.1 and probably later versions, when the PL/pgSQL (plpgsql) language has been created, grants certain plpgsql privileges to the PUBLIC domain, which allows remote attackers to create and execute functions, as demonstrated by functions that perform local brute-force password guessing attacks, which may evade intrusion detection.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PostgreSQL JDBC Driver | =8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-3279 is considered a high severity vulnerability due to the unauthorized execution of functions by attackers.
To fix CVE-2007-3279, restrict PL/pgSQL privileges by modifying the permissions for the PUBLIC role in PostgreSQL.
CVE-2007-3279 affects PostgreSQL version 8.1 and likely later versions.
Due to CVE-2007-3279, attackers can perform local brute-force password guessing attacks by creating and executing functions.
Yes, CVE-2007-3279 is exploitable remotely if the PL/pgSQL language is improperly configured in PostgreSQL.