CVE-2018-10925

It was discovered that PostgreSQL versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 failed to properly check authorization on certain statements involved with "INSERT ... ON CONFLICT DO UPDATE". An attacker with "CREATE TABLE" privileges could exploit this to read arbitrary bytes server memory. If the attacker also had certain "INSERT" and limited "UPDATE" privileges to a particular table, they could exploit this to update other columns in the same table.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html Mailing List Third Party Advisory
http://www.securityfocus.com/bid/105052 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1041446 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2018:2511 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2565 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2566 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3816 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10925 Issue Tracking Patch Third Party Advisory
https://security.gentoo.org/glsa/201810-08 Third Party Advisory
https://usn.ubuntu.com/3744-1/ Third Party Advisory
https://www.debian.org/security/2018/dsa-4269 Third Party Advisory
https://www.postgresql.org/about/news/1878/ Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html Mailing List Third Party Advisory
http://www.securityfocus.com/bid/105052 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1041446 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2018:2511 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2565 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2566 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3816 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10925 Issue Tracking Patch Third Party Advisory
https://security.gentoo.org/glsa/201810-08 Third Party Advisory
https://usn.ubuntu.com/3744-1/ Third Party Advisory
https://www.debian.org/security/2018/dsa-4269 Third Party Advisory
https://www.postgresql.org/about/news/1878/ Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2018-08-09 21:29

Updated : 2024-11-21 03:42


NVD link : CVE-2018-10925

Mitre link : CVE-2018-10925

CVE.ORG link : CVE-2018-10925


JSON object : View

Products Affected

postgresql

  • postgresql

debian

  • debian_linux

canonical

  • ubuntu_linux
CWE
CWE-863

Incorrect Authorization