First published: Fri Apr 16 2010(Updated: )
A flaw was found in the way the PostgreSQL enforced permission checks on scripts written in PL/Tcl. Once the PL/Tcl procedural language was registered on particular database, a remote, authenticated user, privileged to create databases, running a specially-crafted PL/Tcl script, could use this flaw to bypass intended PL/Tcl trusted mode restrictions, allowing them to run arbitrary Tcl scripts with the privileges of the database server. References: [1] PostgreSQL PL/Tcl procedural language manual page: <a href="http://www.postgresql.org/docs/8.1/interactive/pltcl.html">http://www.postgresql.org/docs/8.1/interactive/pltcl.html</a>
Affected Software | Affected Version | How to fix |
---|---|---|
PostgreSQL |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-583072 is considered high due to its potential impact on database security.
To fix REDHAT-BUG-583072, you should apply the latest security patches provided by PostgreSQL for the PL/Tcl procedural language.
REDHAT-BUG-583072 affects systems running PostgreSQL with the PL/Tcl procedural language registered.
Remote, authenticated users with privileges to create databases may exploit REDHAT-BUG-583072.
REDHAT-BUG-583072 is a permission check flaw in the PostgreSQL PL/Tcl scripting language.