Debian DSA-2340-1 : postgresql-8.3, postgresql-8.4, postgresql-9.0 - weak password hashing

medium Nessus Plugin ID 56730

Synopsis

The remote Debian host is missing a security-related update.

Description

magnum discovered that the blowfish password hashing used amongst others in PostgreSQL contained a weakness that would give passwords with 8 bit characters the same hash as weaker equivalents.

Solution

Upgrade the postgresql packages.

For the oldstable distribution (lenny), this problem has been fixed in postgresql-8.3 version 8.3.16-0lenny1.

For the stable distribution (squeeze), this problem has been fixed in postgresql-8.4 version 8.4.9-0squeeze1.

The updates also include reliability improvements, originally scheduled for inclusion into the next point release; for details see the respective changelogs.

See Also

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=631285

https://packages.debian.org/source/squeeze/postgresql-8.4

https://www.debian.org/security/2011/dsa-2340

Plugin Details

Severity: Medium

ID: 56730

File Name: debian_DSA-2340.nasl

Version: 1.10

Type: local

Agent: unix

Published: 11/8/2011

Updated: 1/11/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.3

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:postgresql-8.4, cpe:/o:debian:debian_linux:6.0, cpe:/o:debian:debian_linux:5.0, p-cpe:/a:debian:debian_linux:postgresql-9.0, p-cpe:/a:debian:debian_linux:postgresql-8.3

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 11/7/2011

Reference Information

CVE: CVE-2011-2483

BID: 49241

DSA: 2340