CVE-2012-3489

The xml_parse function in the libxml2 support in the core server component in PostgreSQL 8.3 before 8.3.20, 8.4 before 8.4.13, 9.0 before 9.0.9, and 9.1 before 9.1.5 allows remote authenticated users to determine the existence of arbitrary files or URLs, and possibly obtain file or URL content that triggers a parsing error, via an XML value that refers to (1) a DTD or (2) an entity, related to an XML External Entity (aka XXE) issue.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:apple:mac_os_x_server:10.6.8:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*

Configuration 5 (hide)

cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*

Configuration 6 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*

History

15 Feb 2024, 03:22

Type Values Removed Values Added
References (SUSE) http://lists.opensuse.org/opensuse-updates/2012-10/msg00013.html - (SUSE) http://lists.opensuse.org/opensuse-updates/2012-10/msg00013.html - Mailing List
References (SUSE) http://lists.opensuse.org/opensuse-updates/2012-09/msg00102.html - (SUSE) http://lists.opensuse.org/opensuse-updates/2012-09/msg00102.html - Mailing List
References (SECUNIA) http://secunia.com/advisories/50635 - (SECUNIA) http://secunia.com/advisories/50635 - Broken Link
References (UBUNTU) http://www.ubuntu.com/usn/USN-1542-1 - (UBUNTU) http://www.ubuntu.com/usn/USN-1542-1 - Third Party Advisory
References (DEBIAN) http://www.debian.org/security/2012/dsa-2534 - (DEBIAN) http://www.debian.org/security/2012/dsa-2534 - Mailing List
References (SUSE) http://lists.opensuse.org/opensuse-updates/2012-10/msg00024.html - (SUSE) http://lists.opensuse.org/opensuse-updates/2012-10/msg00024.html - Mailing List
References (CONFIRM) http://www.postgresql.org/docs/8.3/static/release-8-3-20.html - (CONFIRM) http://www.postgresql.org/docs/8.3/static/release-8-3-20.html - Release Notes
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2012-1263.html - (REDHAT) http://rhn.redhat.com/errata/RHSA-2012-1263.html - Third Party Advisory
References (CONFIRM) http://www.postgresql.org/docs/9.1/static/release-9-1-5.html - (CONFIRM) http://www.postgresql.org/docs/9.1/static/release-9-1-5.html - Release Notes
References (CONFIRM) http://www.postgresql.org/docs/9.0/static/release-9-0-9.html - (CONFIRM) http://www.postgresql.org/docs/9.0/static/release-9-0-9.html - Release Notes
References (CONFIRM) http://www.postgresql.org/support/security/ - Vendor Advisory (CONFIRM) http://www.postgresql.org/support/security/ - Release Notes, Vendor Advisory
References (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2012:139 - (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2012:139 - Broken Link
References (APPLE) http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html - (APPLE) http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html - Mailing List
References (SECUNIA) http://secunia.com/advisories/50718 - (SECUNIA) http://secunia.com/advisories/50718 - Broken Link
References (CONFIRM) http://www.postgresql.org/docs/8.4/static/release-8-4-13.html - (CONFIRM) http://www.postgresql.org/docs/8.4/static/release-8-4-13.html - Release Notes
References (SECUNIA) http://secunia.com/advisories/50859 - (SECUNIA) http://secunia.com/advisories/50859 - Broken Link
References (BID) http://www.securityfocus.com/bid/55074 - (BID) http://www.securityfocus.com/bid/55074 - Broken Link, Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/50946 - (SECUNIA) http://secunia.com/advisories/50946 - Broken Link
References (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=849173 - (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=849173 - Issue Tracking, Patch, Release Notes
References (CONFIRM) https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_postgresql2 - (CONFIRM) https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_postgresql2 - Third Party Advisory
CWE CWE-20 CWE-611
CPE cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.0:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.3.14:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.3.17:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.3.11:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.0.6:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.4.5:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.4.6:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.3.7:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.4.11:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.3.3:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.3.2:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.3.5:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.0.3:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.0.8:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.4.7:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.4.4:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.3.13:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.4.3:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.3:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.4.9:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.0.2:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.3.19:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.3.16:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.3.15:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.4.12:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.0.1:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.3.8:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.3.10:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.0.5:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.3.6:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.4:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.4.2:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.0.7:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.3.18:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.3.9:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.3.4:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.0.4:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.4.1:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.4.8:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.3.1:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.3.12:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.4.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.6.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
CVSS v2 : 4.0
v3 : unknown
v2 : 4.0
v3 : 6.5
First Time Redhat enterprise Linux Desktop
Opensuse opensuse
Debian
Apple
Redhat enterprise Linux Workstation
Debian debian Linux
Opensuse
Redhat enterprise Linux Eus
Canonical
Canonical ubuntu Linux
Redhat enterprise Linux Server
Apple mac Os X Server
Redhat

Information

Published : 2012-10-03 21:55

Updated : 2024-02-15 03:22


NVD link : CVE-2012-3489

Mitre link : CVE-2012-3489


JSON object : View

Products Affected

debian

  • debian_linux

redhat

  • enterprise_linux_server
  • enterprise_linux_desktop
  • enterprise_linux_eus
  • enterprise_linux_workstation

canonical

  • ubuntu_linux

apple

  • mac_os_x_server

opensuse

  • opensuse

postgresql

  • postgresql
CWE
CWE-611

Improper Restriction of XML External Entity Reference