aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorremko <remko@FreeBSD.org>2006-08-14 00:44:13 +0800
committerremko <remko@FreeBSD.org>2006-08-14 00:44:13 +0800
commit443f92f3136adf527234d8ec45f9de9c0703f07d (patch)
tree9238d774b82f10e2be1e9b782007c34a09623696
parentc302bd60b23f6d572cfb0caa4b9a66c8888b14a0 (diff)
downloadfreebsd-ports-graphics-443f92f3136adf527234d8ec45f9de9c0703f07d.tar.gz
freebsd-ports-graphics-443f92f3136adf527234d8ec45f9de9c0703f07d.tar.zst
freebsd-ports-graphics-443f92f3136adf527234d8ec45f9de9c0703f07d.zip
Document postgresql -- encoding based SQL injection.
Reported by: Radim Kolar <hsn at netmag dot cz>
-rw-r--r--security/vuxml/vuln.xml50
1 files changed, 50 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 71caaa0abf4..93f5406f9e1 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,56 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="17f53c1d-2ae9-11db-a6e2-000e0c2e438a">
+ <topic>postgresql -- encoding based SQL injection</topic>
+ <affects>
+ <package>
+ <name>postgresql</name>
+ <name>postgresql-server</name>
+ <name>ja-postgresql</name>
+ <range><ge>7.3</ge><lt>7.3.15</lt></range>
+ <range><ge>7.4</ge><lt>7.4.13</lt></range>
+ <range><ge>8.0.0</ge><lt>8.0.8</lt></range>
+ <range><ge>8.1.0</ge><lt>8.1.4</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The PostgreSQL development team reports:</p>
+ <blockquote cite="http://www.postgresql.org/docs/techdocs.50">
+ <p>An attacker able to submit crafted strings to an
+ application that will embed those strings in SQL commands
+ can use invalidly-encoded multibyte characters to bypass
+ standard string-escaping methods, resulting in possible
+ injection of hostile SQL commands into the database. The
+ attacks covered here work in any multibyte encoding.</p>
+ <p>The widely-used practice of escaping ASCII single quote
+ "'" by turning it into "\'" is unsafe when operating in
+ multibyte encodings that allow 0x5c (ASCII code for
+ backslash) as the trailing byte of a multibyte character;
+ this includes at least SJIS, BIG5, GBK, GB18030, and UHC.
+ An application that uses this conversion while embedding
+ untrusted strings in SQL commands is vulnerable to
+ SQL-injection attacks if it communicates with the server in
+ one of these encodings. While the standard client libraries
+ used with PostgreSQL have escaped "'" in the safe,
+ SQL-standard way of "''" for some time, the older practice
+ remains common.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <bid>18092</bid>
+ <cvename>CVE-2006-2313</cvename>
+ <cvename>CVE-2006-2314</cvename>
+ <url>http://www.postgresql.org/docs/techdocs.50</url>
+ </references>
+ <dates>
+ <discovery>2006-05-11</discovery>
+ <entry>2006-08-13</entry>
+ </dates>
+ </vuln>
+
<vuln vid="65c8ecf9-2adb-11db-a6e2-000e0c2e438a">
<topic>postgresql -- multiple vulnerabilities</topic>
<affects>