CentOS 5 / 6 : perl-DBD-Pg (CESA-2012:1116)

medium Nessus Plugin ID 60121

Synopsis

The remote CentOS host is missing a security update.

Description

An updated perl-DBD-Pg package that fixes two security issues is now available for Red Hat Enterprise Linux 5 and 6.

The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.

Perl DBI is a database access Application Programming Interface (API) for the Perl language. perl-DBD-Pg allows Perl applications to access PostgreSQL database servers.

Two format string flaws were found in perl-DBD-Pg. A specially crafted database warning or error message from a server could cause an application using perl-DBD-Pg to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2012-1151)

All users of perl-DBD-Pg are advised to upgrade to this updated package, which contains a backported patch to fix these issues.
Applications using perl-DBD-Pg must be restarted for the update to take effect.

Solution

Update the affected perl-dbd-pg package.

See Also

http://www.nessus.org/u?e94e504a

http://www.nessus.org/u?ec63c8e5

Plugin Details

Severity: Medium

ID: 60121

File Name: centos_RHSA-2012-1116.nasl

Version: 1.13

Type: local

Agent: unix

Published: 7/26/2012

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS Score Source: CVE-2012-1151

Vulnerability Information

CPE: p-cpe:/a:centos:centos:perl-dbd-pg, cpe:/o:centos:centos:5, cpe:/o:centos:centos:6

Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 7/25/2012

Vulnerability Publication Date: 9/9/2012

Reference Information

CVE: CVE-2012-1151

BID: 52378

RHSA: 2012:1116