CVE-2017-12172
Severity CVSS v4.0:
Pending analysis
Type:
CWE-59
Link Following
Publication date:
22/11/2017
Last modified:
20/04/2025
Description
PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, 9.5.x before 9.5.10, 9.4.x before 9.4.15, 9.3.x before 9.3.20, and 9.2.x before 9.2.24 runs under a non-root operating system account, and database superusers have effective ability to run arbitrary code under that system account. PostgreSQL provides a script for starting the database server during system boot. Packages of PostgreSQL for many operating systems provide their own, packager-authored startup implementations. Several implementations use a log file name that the database superuser can replace with a symbolic link. As root, they open(), chmod() and/or chown() this log file name. This often suffices for the database superuser to escalate to root privileges when root starts the server.
Impact
Base Score 3.x
6.70
Severity 3.x
MEDIUM
Base Score 2.0
7.20
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postgresql:postgresql:9.2.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postgresql:postgresql:9.2.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postgresql:postgresql:9.2.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postgresql:postgresql:9.2.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postgresql:postgresql:9.2.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postgresql:postgresql:9.2.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postgresql:postgresql:9.2.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postgresql:postgresql:9.2.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postgresql:postgresql:9.2.12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postgresql:postgresql:9.2.13:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postgresql:postgresql:9.2.14:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.securityfocus.com/bid/101949
- http://www.securitytracker.com/id/1039752
- https://access.redhat.com/errata/RHSA-2017:3402
- https://access.redhat.com/errata/RHSA-2017:3403
- https://access.redhat.com/errata/RHSA-2017:3404
- https://access.redhat.com/errata/RHSA-2017:3405
- https://www.postgresql.org/about/news/1801/
- https://www.postgresql.org/support/security/
- http://www.securityfocus.com/bid/101949
- http://www.securitytracker.com/id/1039752
- https://access.redhat.com/errata/RHSA-2017:3402
- https://access.redhat.com/errata/RHSA-2017:3403
- https://access.redhat.com/errata/RHSA-2017:3404
- https://access.redhat.com/errata/RHSA-2017:3405
- https://www.postgresql.org/about/news/1801/
- https://www.postgresql.org/support/security/



