First published: Wed Jul 18 2012(Updated: )
PostgreSQL 8.4.x before 8.4.11, 9.0.x before 9.0.7, and 9.1.x before 9.1.3 truncates the common name to only 32 characters when verifying SSL certificates, which allows remote attackers to spoof connections when the host name is exactly 32 characters.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
openSUSE | =12.2 | |
PostgreSQL | =8.4 | |
PostgreSQL | =8.4.1 | |
PostgreSQL | =8.4.2 | |
PostgreSQL | =8.4.3 | |
PostgreSQL | =8.4.4 | |
PostgreSQL | =8.4.5 | |
PostgreSQL | =8.4.6 | |
PostgreSQL | =8.4.7 | |
PostgreSQL | =8.4.8 | |
PostgreSQL | =8.4.9 | |
PostgreSQL | =8.4.10 | |
PostgreSQL | =9.0 | |
PostgreSQL | =9.0.1 | |
PostgreSQL | =9.0.2 | |
PostgreSQL | =9.0.3 | |
PostgreSQL | =9.0.4 | |
PostgreSQL | =9.0.5 | |
PostgreSQL | =9.0.6 | |
Debian Linux | =6.0 | |
Red Hat Enterprise Linux Workstation | =5 | |
Red Hat Enterprise Linux | =5.0 | |
Red Hat Enterprise Linux Desktop | =5.0 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux HPC Node | =6.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =6.2 | |
Red Hat Enterprise Linux Server | =6.2.z | |
Red Hat Enterprise Linux Workstation | =6.0 | |
PostgreSQL | =9.1 | |
PostgreSQL | =9.1.1 | |
PostgreSQL | =9.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-0867 is rated as a medium severity vulnerability.
To fix CVE-2012-0867, you should upgrade to PostgreSQL version 8.4.11, 9.0.7, or 9.1.3 or later.
The impact of CVE-2012-0867 allows attackers to spoof SSL connections by exploiting a 32-character limit on common names.
PostgreSQL versions 8.4.x before 8.4.11, 9.0.x before 9.0.7, and 9.1.x before 9.1.3 are affected by CVE-2012-0867.
Yes, CVE-2012-0867 affects PostgreSQL on various operating systems including OpenSUSE, Red Hat Enterprise Linux, and Debian.