First published: Fri Nov 12 2021(Updated: )
PostgreSQL is vulnerable to a man-in-the-middle attack, caused by improper validation of user-supplied input by libpq. A remote attacker could exploit this vulnerability to launch a man-in-the-middle attack to inject false responses to the client's first few queries, despite the use of SSL certificate verification and encryption.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Spectrum Protect Plus | <=10.1.0.0-10.1.9.2 | |
redhat/postgresql | <9.6.24 | 9.6.24 |
redhat/postgresql | <10.19 | 10.19 |
redhat/postgresql | <11.14 | 11.14 |
redhat/postgresql | <12.9 | 12.9 |
redhat/postgresql | <13.5 | 13.5 |
redhat/postgresql | <14.1 | 14.1 |
PostgreSQL PostgreSQL | >=9.6<9.6.24 | |
PostgreSQL PostgreSQL | >=10.0<10.19 | |
PostgreSQL PostgreSQL | >=11.0<11.14 | |
PostgreSQL PostgreSQL | >=12.0<12.9 | |
PostgreSQL PostgreSQL | >=13.0<13.5 | |
PostgreSQL PostgreSQL | =14.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-23222 is a vulnerability in PostgreSQL that allows a man-in-the-middle attacker to inject false responses to the client's queries.
CVE-2021-23222 affects versions of PostgreSQL up to 9.6.24, 10.19, 11.14, 12.9, 13.5, and 14.0.
The severity of CVE-2021-23222 is medium, with a CVSS score of 5.9.
To prevent a man-in-the-middle attack in PostgreSQL, users should update to the latest version that includes the fix.
More information about CVE-2021-23222 can be found on Red Hat Bugzilla and the official PostgreSQL git repository.