PostgreSQL LDAP Anonymous Bind Authentication Bypass

medium Nessus Plugin ID 40947

Synopsis

The database service running on the remote host has an authentication bypass vulnerability.

Description

The version of PostgreSQL running on the remote host has an authentication bypass vulnerability. If PostgreSQL is using LDAP authentication, and the LDAP server is configured to allow anonymous binds, it may be possible to log into the PostgreSQL server using a blank password. A remote attacker could exploit this to gain access to the database server, possibly as an administrator.

There are reportedly other vulnerabilities in this version of PostgreSQL, though Nessus has not checked for those issues.

Solution

Upgrade to PostgreSQL 8.2.14 / 8.3.8 or later.

See Also

http://www.postgresql.org/about/news.1135

https://www.postgresql.org/support/security/

Plugin Details

Severity: Medium

ID: 40947

File Name: postgresql_ldap_auth_bypass.nasl

Version: 1.13

Type: remote

Family: Databases

Published: 9/11/2009

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.3

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:postgresql:postgresql

Exploit Ease: No known exploits are available

Patch Publication Date: 9/9/2009

Vulnerability Publication Date: 9/9/2009

Reference Information

CVE: CVE-2009-3231

BID: 36314

CWE: 287

SECUNIA: 36660