CVE-2017-12172

CVSS V2 High 7.2 CVSS V3 Medium 6.7
Description
PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, 9.5.x before 9.5.10, 9.4.x before 9.4.15, 9.3.x before 9.3.20, and 9.2.x before 9.2.24 runs under a non-root operating system account, and database superusers have effective ability to run arbitrary code under that system account. PostgreSQL provides a script for starting the database server during system boot. Packages of PostgreSQL for many operating systems provide their own, packager-authored startup implementations. Several implementations use a log file name that the database superuser can replace with a symbolic link. As root, they open(), chmod() and/or chown() this log file name. This often suffices for the database superuser to escalate to root privileges when root starts the server.
Overview
  • CVE ID
  • CVE-2017-12172
  • Assigner
  • secalert@redhat.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2017-11-22T19:29:00
  • Last Modified Date
  • 2019-10-09T23:22:24
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.2.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.2.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.2.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.2.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.2.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.2.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.2.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.2.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.2.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.2.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.2.14:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.2.15:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.2.16:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.2.17:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.2.18:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.2.19:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.2.20:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.2.21:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.2.22:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.2.23:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:L/AC:L/Au:N/C:C/I:C/A:C
  • Access Vector
  • LOCAL
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • COMPLETE
  • Integrity Impact
  • COMPLETE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 7.2
  • Severity
  • HIGH
  • Exploitability Score
  • 3.9
  • Impact Score
  • 10
CVSS Version 3
  • Version
  • 3.0
  • Vector String
  • CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector
  • LOCAL
  • Attack Compatibility
  • LOW
  • Privileges Required
  • HIGH
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 6.7
  • Base Severity
  • MEDIUM
  • Exploitability Score
  • 0.8
  • Impact Score
  • 5.9
References
Reference URL Reference Tags
https://www.postgresql.org/support/security/ Issue Tracking Vendor Advisory
https://www.postgresql.org/about/news/1801/ Issue Tracking Vendor Advisory
http://www.securitytracker.com/id/1039752 Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/101949 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:3405 Issue Tracking Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3404 Issue Tracking Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3403 Issue Tracking Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3402 Issue Tracking Third Party Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 17:12:27 Added to TrackCVE
2022-12-02 23:19:09 2017-11-22T19:29Z 2017-11-22T19:29:00 CVE Published Date updated
2022-12-02 23:19:09 2019-10-09T23:22:24 CVE Modified Date updated
2022-12-02 23:19:09 Modified Vulnerability Status updated