Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2017-12172 | First vendor Publication | 2017-11-22 |
Vendor | Cve | Last vendor Modification | 2019-10-09 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | |||
---|---|---|---|
Overall CVSS Score | 6.7 | ||
Base Score | 6.7 | Environmental Score | 6.7 |
impact SubScore | 5.9 | Temporal Score | 6.7 |
Exploitabality Sub Score | 0.8 | ||
Attack Vector | Local | Attack Complexity | Low |
Privileges Required | High | User Interaction | None |
Scope | Unchanged | Confidentiality Impact | High |
Integrity Impact | High | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.2 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, 9.5.x before 9.5.10, 9.4.x before 9.4.15, 9.3.x before 9.3.20, and 9.2.x before 9.2.24 runs under a non-root operating system account, and database superusers have effective ability to run arbitrary code under that system account. PostgreSQL provides a script for starting the database server during system boot. Packages of PostgreSQL for many operating systems provide their own, packager-authored startup implementations. Several implementations use a log file name that the database superuser can replace with a symbolic link. As root, they open(), chmod() and/or chown() this log file name. This often suffices for the database superuser to escalate to root privileges when root starts the server. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12172 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-59 | Improper Link Resolution Before File Access ('Link Following') |
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2018-08-17 | Name : The remote PhotonOS host is missing multiple security updates. File : PhotonOS_PHSA-2017-0048.nasl - Type : ACT_GATHER_INFO |
2018-03-21 | Name : The remote device is affected by multiple vulnerabilities. File : juniper_space_jsa_10838.nasl - Type : ACT_GATHER_INFO |
2017-12-18 | Name : The remote EulerOS host is missing multiple security updates. File : EulerOS_SA-2017-1340.nasl - Type : ACT_GATHER_INFO |
2017-12-18 | Name : The remote EulerOS host is missing multiple security updates. File : EulerOS_SA-2017-1341.nasl - Type : ACT_GATHER_INFO |
2017-12-11 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2017-3402.nasl - Type : ACT_GATHER_INFO |
2017-12-11 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2017-3402.nasl - Type : ACT_GATHER_INFO |
2017-12-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2017-3402.nasl - Type : ACT_GATHER_INFO |
2017-12-07 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2017-930.nasl - Type : ACT_GATHER_INFO |
2017-12-07 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2017-931.nasl - Type : ACT_GATHER_INFO |
2017-11-15 | Name : The remote database server is affected by multiple vulnerabilities. File : postgresql_20171109.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2021-05-04 12:57:43 |
|
2021-04-22 02:11:17 |
|
2020-05-23 00:55:23 |
|
2019-10-10 05:19:41 |
|
2017-12-19 13:23:50 |
|
2017-12-12 13:24:21 |
|
2017-12-12 00:21:37 |
|
2017-12-09 13:24:14 |
|
2017-12-09 09:22:21 |
|
2017-12-08 13:23:04 |
|
2017-11-25 09:21:46 |
|
2017-11-24 09:21:53 |
|
2017-11-23 00:22:01 |
|