CVE-2009-3231

The core server component in PostgreSQL 8.3 before 8.3.8 and 8.2 before 8.2.14, when using LDAP authentication with anonymous binds, allows remote attackers to bypass authentication via an empty password.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise:11.0:-:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:*:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise:10.0:sp2:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*

History

13 Feb 2024, 17:41

Type Values Removed Values Added
References (CONFIRM) http://www.postgresql.org/support/security.html - Vendor Advisory (CONFIRM) http://www.postgresql.org/support/security.html - Broken Link, Vendor Advisory
References (BUGTRAQ) http://www.securityfocus.com/archive/1/509917/100/0/threaded - (BUGTRAQ) http://www.securityfocus.com/archive/1/509917/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References (CONFIRM) http://www.postgresql.org/docs/8.3/static/release-8-3-8.html - (CONFIRM) http://www.postgresql.org/docs/8.3/static/release-8-3-8.html - Release Notes
References (SECUNIA) http://secunia.com/advisories/36837 - (SECUNIA) http://secunia.com/advisories/36837 - Broken Link
References (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=522084 - (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=522084 - Issue Tracking, Patch
References (SECUNIA) http://secunia.com/advisories/36800 - (SECUNIA) http://secunia.com/advisories/36800 - Broken Link
References (CONFIRM) http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0012 - (CONFIRM) http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0012 - Broken Link
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html - Mailing List
References (DEBIAN) http://www.us.debian.org/security/2009/dsa-1900 - (DEBIAN) http://www.us.debian.org/security/2009/dsa-1900 - Broken Link
References (BID) http://www.securityfocus.com/bid/36314 - (BID) http://www.securityfocus.com/bid/36314 - Broken Link, Third Party Advisory, VDB Entry
References (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2009-September/msg00305.html - (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2009-September/msg00305.html - Mailing List
References (UBUNTU) http://www.ubuntu.com/usn/usn-834-1 - (UBUNTU) http://www.ubuntu.com/usn/usn-834-1 - Third Party Advisory
References (HP) http://marc.info/?l=bugtraq&m=134124585221119&w=2 - (HP) http://marc.info/?l=bugtraq&m=134124585221119&w=2 - Mailing List
References (SECUNIA) http://secunia.com/advisories/36727 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/36727 - Broken Link, Vendor Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html - Mailing List
References (SECUNIA) http://secunia.com/advisories/36660 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/36660 - Broken Link, Vendor Advisory
References (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2009-September/msg00307.html - (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2009-September/msg00307.html - Mailing List
First Time Suse linux Enterprise Server
Fedoraproject
Opensuse opensuse
Fedoraproject fedora
Opensuse
Canonical
Canonical ubuntu Linux
Suse linux Enterprise
Suse
CPE cpe:2.3:a:postgresql:postgresql:8.2.13:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.2.12:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.2.2:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.3.7:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.3.3:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.3.2:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.3.5:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.2.11:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.3:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.2.1:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.2.8:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.2.9:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.2.4:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.3.6:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.2.7:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.2.10:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.3.4:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.2.3:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.2.6:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.2:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.3.1:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.2.5:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise:10.0:sp2:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:*:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
cpe:2.3:o:suse:linux_enterprise:11.0:-:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*

Information

Published : 2009-09-17 10:30

Updated : 2024-02-13 17:41


NVD link : CVE-2009-3231

Mitre link : CVE-2009-3231


JSON object : View

Products Affected

fedoraproject

  • fedora

canonical

  • ubuntu_linux

suse

  • linux_enterprise_server
  • linux_enterprise

opensuse

  • opensuse

postgresql

  • postgresql
CWE
CWE-287

Improper Authentication