First published: Fri Dec 16 2016(Updated: )
An issue was discovered in Pivotal Greenplum before 4.3.10.0. Creation of external tables using GPHDFS protocol has a vulnerability whereby arbitrary commands can be injected into the system. In order to exploit this vulnerability the user must have superuser 'gpadmin' access to the system or have been granted GPHDFS protocol permissions in order to create a GPHDFS external table.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Greenplum | <=4.3.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6656 is categorized as a high severity vulnerability due to the potential for arbitrary command injection.
To mitigate CVE-2016-6656, upgrade Pivotal Greenplum to version 4.3.10.0 or later where the vulnerability has been addressed.
CVE-2016-6656 affects users of Pivotal Greenplum versions prior to 4.3.10.0 with superuser 'gpadmin' access.
Exploitation of CVE-2016-6656 requires superuser 'gpadmin' access or equivalent privileges on the system.
CVE-2016-6656 allows for arbitrary command injection, which can lead to unauthorized execution of commands on the affected system.