First published: Tue Feb 20 2018(Updated: )
A flaw was found in the way Postgresql allowed a user to modify the behavior of a query for other users. An attacker with a user account could use this flaw to execute code with the permissions of superuser in the database.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/cfme | <0:5.9.6.5-3.el7cf | 0:5.9.6.5-3.el7cf |
redhat/cfme-amazon-smartstate | <0:5.9.6.5-2.el7cf | 0:5.9.6.5-2.el7cf |
redhat/cfme-appliance | <0:5.9.6.5-1.el7cf | 0:5.9.6.5-1.el7cf |
redhat/cfme-gemset | <0:5.9.6.5-2.el7cf | 0:5.9.6.5-2.el7cf |
redhat/dbus-api-service | <0:1.0.1-3.1.el7cf | 0:1.0.1-3.1.el7cf |
redhat/httpd-configmap-generator | <0:0.2.2-1.2.el7cf | 0:0.2.2-1.2.el7cf |
redhat/postgresql96 | <0:9.6.10-1PGDG.el7a | 0:9.6.10-1PGDG.el7a |
redhat/rh-postgresql95-postgresql | <0:9.5.14-1.el6 | 0:9.5.14-1.el6 |
redhat/rh-postgresql96-postgresql | <0:9.6.10-1.el6 | 0:9.6.10-1.el6 |
redhat/rh-postgresql95-postgresql | <0:9.5.14-1.el7 | 0:9.5.14-1.el7 |
redhat/rh-postgresql96-postgresql | <0:9.6.10-1.el7 | 0:9.6.10-1.el7 |
redhat/postgresql | <10.3 | 10.3 |
redhat/postgresql | <9.6.8 | 9.6.8 |
redhat/postgresql | <9.5.12 | 9.5.12 |
redhat/postgresql | <9.4.17 | 9.4.17 |
redhat/postgresql | <9.3.22 | 9.3.22 |
PostgreSQL PostgreSQL | >=9.3<9.3.22 | |
PostgreSQL PostgreSQL | >=9.4<9.4.17 | |
PostgreSQL PostgreSQL | >=9.5<9.5.12 | |
PostgreSQL PostgreSQL | >=9.6<9.6.8 | |
PostgreSQL PostgreSQL | >=10.0<10.3 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
Redhat Cloudforms | =4.6 | |
IBM Security Verify Governance | <=10.0 | |
debian/postgresql-10 | ||
debian/postgresql-9.1 |
Upstream suggests the following mitigation can be used to protect against this security flaw: https://wiki.postgresql.org/wiki/A_Guide_to_CVE-2018-1058:_Protect_Your_Search_Path
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2018-1058 is a vulnerability in Postgresql that could allow a remote attacker to execute arbitrary code on the system.
CVE-2018-1058 affects Postgresql by allowing a remote authenticated attacker to modify the behavior of a query for other users, potentially executing arbitrary code with superuser permissions.
The severity of CVE-2018-1058 is rated as high, with a CVSS score of 8.8 out of 10.
Postgresql versions 10.3, 9.6.8, 9.5.12, 9.4.17, and 9.3.22 are affected by CVE-2018-1058.
To fix the CVE-2018-1058 vulnerability, update Postgresql to version 10.3 or apply the necessary patches provided by the vendor.