First published: Thu Aug 30 2018(Updated: )
A weakness was found in postgresql-jdbc before version 42.2.5. It was possible to provide an SSL Factory and not check the host name if a host name verifier was not provided to the driver. This could lead to a condition where a man-in-the-middle attacker could masquerade as a trusted server by providing a certificate for the wrong host, as long as it was signed by a trusted CA.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PostgreSQL JDBC Driver | <42.2.5 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10936 is a vulnerability found in postgresql-jdbc before version 42.2.5 that allows a man-in-the-middle attacker to masquerade as a trusted server.
The severity of CVE-2018-10936 is high, with a severity value of 8.1.
CVE-2018-10936 affects Postgresql Postgresql Jdbc Driver versions up to 42.2.5 and Redhat Enterprise Linux versions 6.0 and 7.0.
To fix CVE-2018-10936, upgrade to postgresql-jdbc version 42.2.5 or newer and apply the necessary patches for affected Redhat Enterprise Linux versions.
You can find more information about CVE-2018-10936 at the following references: http://www.securityfocus.com/bid/105220, https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10936, https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E