CVE-2010-1169 Details

CVE-2010-1169

Published: 2010-05-19
Last Modified: 2017-09-19
CVE Author: NIST National Vulnerability Database
CVE Assigner: cve@mitre.org
Summary

PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2 does not properly restrict PL/perl procedures, which allows remote authenticated users, with database-creation privileges, to execute arbitrary Perl code via a crafted script, related to the Safe module (aka Safe.pm) for Perl. NOTE: some sources report that this issue is the same as CVE-2010-1447.

Analysis
Common Vulnerability Score System v2.0
Severity High
Base Score 8.5/10
Exploit Score 6.8/10
Access Vector Network
Access Complexity Medium
Authentication Single
Impact Score 10/10
Confidentiality Impact Complete
Availability Impact Complete
Integrity Impact Complete
Vector String AV:N/AC:M/Au:S/C:C/I:C/A:C
Common Vulnerability Score System v3.1

NIST has not assigned a CVSSv3.1 Score.

Products Reported
CPE Vulnerable Start Excluding
cpe:2.3:a:postgresql:postgresql:7.4:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:7.4.8:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:7.4.9:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:7.4.10:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:7.4.11:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:7.4.12:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:7.4.13:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:7.4.14:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:7.4.15:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:7.4.16:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:7.4.17:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:7.4.18:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:7.4.19:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:7.4.20:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:7.4.21:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:7.4.22:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:7.4.23:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:7.4.24:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:7.4.25:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:7.4.26:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:7.4.27:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:7.4.28:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.0.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.0.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.0.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.0.3:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.0.4:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.0.5:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.0.6:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.0.7:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.0.8:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.0.9:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.0.10:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.0.11:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.0.12:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.0.13:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.0.14:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.0.15:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.0.16:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.0.17:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.0.18:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.0.19:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.0.20:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.0.21:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.0.22:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.0.23:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.0.24:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.1.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.1.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.1.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.1.3:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.1.4:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.1.5:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.1.6:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.1.7:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.1.8:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.1.9:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.1.10:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.1.11:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.1.12:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.1.13:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.1.14:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.1.15:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.1.16:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.1.17:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.1.18:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.1.19:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.1.20:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.2.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.2.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.2.3:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.2.4:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.2.5:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.2.6:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.2.7:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.2.8:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.2.9:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.2.10:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.2.11:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.2.12:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.2.13:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.2.14:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.2.15:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.2.16:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.3:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.3.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.3.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.3.3:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.3.4:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.3.5:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.3.6:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.3.7:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.3.8:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.3.9:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.3.10:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.4:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.4.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.4.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:8.4.3:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:postgresql:postgresql:9.0.0:beta1:*:*:*:*:*:* Yes - -
References

http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041559.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041579.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041591.html
http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
http://marc.info/?l=bugtraq&m=134124585221119&w=2
http://osvdb.org/64755
http://secunia.com/advisories/39815
http://secunia.com/advisories/39820
http://secunia.com/advisories/39845
http://secunia.com/advisories/39898
http://secunia.com/advisories/39939
http://www.debian.org/security/2010/dsa-2051
http://www.mandriva.com/security/advisories?name=MDVSA-2010:103
http://www.openwall.com/lists/oss-security/2010/05/20/5
http://www.postgresql.org/about/news.1203
http://www.postgresql.org/docs/current/static/release-7-4-29.html
http://www.postgresql.org/docs/current/static/release-8-0-25.html
http://www.postgresql.org/docs/current/static/release-8-1-21.html
http://www.postgresql.org/docs/current/static/release-8-2-17.html
http://www.postgresql.org/docs/current/static/release-8-3-11.html
http://www.postgresql.org/docs/current/static/release-8-4-4.html
http://www.postgresql.org/support/security
http://www.redhat.com/support/errata/RHSA-2010-0427.html
http://www.redhat.com/support/errata/RHSA-2010-0428.html
http://www.redhat.com/support/errata/RHSA-2010-0429.html
http://www.redhat.com/support/errata/RHSA-2010-0430.html
http://www.securityfocus.com/bid/40215
http://www.securitytracker.com/id?1023988
http://www.vupen.com/english/advisories/2010/1167
http://www.vupen.com/english/advisories/2010/1182
http://www.vupen.com/english/advisories/2010/1197
http://www.vupen.com/english/advisories/2010/1198
http://www.vupen.com/english/advisories/2010/1207
http://www.vupen.com/english/advisories/2010/1221
https://bugzilla.redhat.com/show_bug.cgi?id=582615
https://bugzilla.redhat.com/show_bug.cgi?id=588269
https://exchange.xforce.ibmcloud.com/vulnerabilities/58693
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10645

CVE ID
CVE-2010-1169
Published
2010-05-19
Modified
2017-09-19
CVSSv2.0
High
PCI Compliance
Fail
US-CERT Alert
No
CWE
CWE-94

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities.