First published: Thu Apr 04 2013(Updated: )
PostgreSQL 9.2.x before 9.2.4 and 9.1.x before 9.1.9 does not properly check REPLICATION privileges, which allows remote authenticated users to bypass intended backup restrictions by calling the (1) pg_start_backup or (2) pg_stop_backup functions.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PostgreSQL | =9.2 | |
PostgreSQL | =9.2.1 | |
PostgreSQL | =9.2.2 | |
PostgreSQL | =9.2.3 | |
PostgreSQL | =9.1 | |
PostgreSQL | =9.1.1 | |
PostgreSQL | =9.1.2 | |
PostgreSQL | =9.1.3 | |
PostgreSQL | =9.1.4 | |
PostgreSQL | =9.1.5 | |
PostgreSQL | =9.1.6 | |
PostgreSQL | =9.1.7 | |
PostgreSQL | =9.1.8 | |
Ubuntu | =8.04 | |
Ubuntu | =10.04 | |
Ubuntu | =11.10 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1901 is classified as a medium severity vulnerability due to its potential for remote authenticated users to bypass backup restrictions.
To fix CVE-2013-1901, upgrade your PostgreSQL installation to version 9.2.4 or 9.1.9 or higher.
CVE-2013-1901 affects PostgreSQL versions 9.1.x before 9.1.9 and 9.2.x before 9.2.4.
The functions exploited in CVE-2013-1901 are pg_start_backup and pg_stop_backup.
Remote authenticated users with REPLICATION privileges can exploit CVE-2013-1901 to bypass backup restrictions.