Untrusted search path vulnerability in PostgreSQL before 7.3.19, 7.4.x before 7.4.17, 8.0.x before 8.0.13, 8.1.x before 8.1.9, and 8.2.x before 8.2.4 allows remote authenticated users, when permitted to call a SECURITY DEFINER function, to gain the privileges of the function owner, related to search_path settings.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Postgresql | Postgresql | * | 7.3.19 (excluding) |
Postgresql | Postgresql | 7.4 (including) | 7.4.17 (excluding) |
Postgresql | Postgresql | 8.0 (including) | 8.0.13 (excluding) |
Postgresql | Postgresql | 8.1 (including) | 8.1.9 (excluding) |
Postgresql | Postgresql | 8.2 (including) | 8.2.4 (excluding) |
Red Hat Enterprise Linux 3 | RedHat | rh-postgresql-0:7.3.19-1 | * |
Red Hat Enterprise Linux 4 | RedHat | postgresql-0:7.4.17-1.RHEL4.1 | * |
Red Hat Enterprise Linux 5 | RedHat | postgresql-0:8.1.9-1.el5 | * |
Red Hat Web Application Stack for RHEL 4 | RedHat | postgresql-0:8.1.9-1.el4s1.1 | * |
Postgresql-8.1 | Ubuntu | dapper | * |
Postgresql-8.1 | Ubuntu | edgy | * |
Postgresql-8.1 | Ubuntu | feisty | * |
Postgresql-8.1 | Ubuntu | gutsy | * |
Postgresql-8.2 | Ubuntu | feisty | * |
Postgresql-8.2 | Ubuntu | gutsy | * |
Postgresql-8.2 | Ubuntu | hardy | * |