ID

VAR-201403-0512


CVE

CVE-2014-0067


TITLE

PostgreSQL For the test suite "make check" Command privilege vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2014-001850

DESCRIPTION

The "make check" command for the test suites in PostgreSQL 9.3.3 and earlier does not properly invoke initdb to specify the authentication requirements for a database cluster to be used for the tests, which allows local users to gain privileges by leveraging access to this cluster. PostgreSQL is prone to a local privilege-escalation vulnerability. Local attackers can exploit this issue to gain elevated privileges. BUGTRAQ ID: 65721 CVE(CAN) ID: CVE-2014-0067 PostgreSQL is an advanced object-relational database management system that supports an extended subset of the SQL standard. 0 PostgreSQL PostgreSQL 8.x vendor patch: PostgreSQL ---------- At present, the vendor has released an upgrade patch to fix this security problem, please go to the vendor's homepage to download: http://www.postgresql.org. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2015-08-13-2 OS X Yosemite v10.10.5 and Security Update 2015-006 OS X Yosemite v10.10.5 and Security Update 2015-006 is now available and addresses the following: apache Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 Impact: Multiple vulnerabilities existed in Apache 2.4.16, the most serious of which may allow a remote attacker to cause a denial of service. Description: Multiple vulnerabilities existed in Apache versions prior to 2.4.16. These were addressed by updating Apache to version 2.4.16. CVE-ID CVE-2014-3581 CVE-2014-3583 CVE-2014-8109 CVE-2015-0228 CVE-2015-0253 CVE-2015-3183 CVE-2015-3185 apache_mod_php Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 Impact: Multiple vulnerabilities existed in PHP 5.5.20, the most serious of which may lead to arbitrary code execution. Description: Multiple vulnerabilities existed in PHP versions prior to 5.5.20. These were addressed by updating Apache to version 5.5.27. CVE-ID CVE-2015-2783 CVE-2015-2787 CVE-2015-3307 CVE-2015-3329 CVE-2015-3330 CVE-2015-4021 CVE-2015-4022 CVE-2015-4024 CVE-2015-4025 CVE-2015-4026 CVE-2015-4147 CVE-2015-4148 Apple ID OD Plug-in Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A malicious application may be able change the password of a local user Description: In some circumstances, a state management issue existed in password authentication. The issue was addressed through improved state management. CVE-ID CVE-2015-3799 : an anonymous researcher working with HP's Zero Day Initiative AppleGraphicsControl Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A malicious application may be able to determine kernel memory layout Description: An issue existed in AppleGraphicsControl which could have led to the disclosure of kernel memory layout. This issue was addressed through improved bounds checking. CVE-ID CVE-2015-5768 : JieTao Yang of KeenTeam Bluetooth Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A local user may be able to execute arbitrary code with system privileges Description: A memory corruption issue existed in IOBluetoothHCIController. This issue was addressed through improved memory handling. CVE-ID CVE-2015-3779 : Teddy Reed of Facebook Security Bluetooth Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A malicious application may be able to determine kernel memory layout Description: A memory management issue could have led to the disclosure of kernel memory layout. This issue was addressed with improved memory management. CVE-ID CVE-2015-3780 : Roberto Paleari and Aristide Fattori of Emaze Networks Bluetooth Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A malicious app may be able to access notifications from other iCloud devices Description: An issue existed where a malicious app could access a Bluetooth-paired Mac or iOS device's Notification Center notifications via the Apple Notification Center Service. The issue affected devices using Handoff and logged into the same iCloud account. This issue was resolved by revoking access to the Apple Notification Center Service. CVE-ID CVE-2015-3786 : Xiaolong Bai (Tsinghua University), System Security Lab (Indiana University), Tongxin Li (Peking University), XiaoFeng Wang (Indiana University) Bluetooth Available for: OS X Yosemite v10.10 to v10.10.4 Impact: An attacker with privileged network position may be able to perform denial of service attack using malformed Bluetooth packets Description: An input validation issue existed in parsing of Bluetooth ACL packets. This issue was addressed through improved input validation. CVE-ID CVE-2015-3787 : Trend Micro Bluetooth Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A local attacker may be able to cause unexpected application termination or arbitrary code execution Description: Multiple buffer overflow issues existed in blued's handling of XPC messages. These issues were addressed through improved bounds checking. CVE-ID CVE-2015-3777 : mitp0sh of [PDX] bootp Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A malicious Wi-Fi network may be able to determine networks a device has previously accessed Description: Upon connecting to a Wi-Fi network, iOS may have broadcast MAC addresses of previously accessed networks via the DNAv4 protocol. This issue was addressed through disabling DNAv4 on unencrypted Wi-Fi networks. CVE-ID CVE-2015-3778 : Piers O'Hanlon of Oxford Internet Institute, University of Oxford (on the EPSRC Being There project) CloudKit Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A malicious application may be able to access the iCloud user record of a previously signed in user Description: A state inconsistency existed in CloudKit when signing out users. This issue was addressed through improved state handling. CVE-ID CVE-2015-3782 : Deepkanwal Plaha of University of Toronto CoreMedia Playback Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: Memory corruption issues existed in CoreMedia Playback. These were addressed through improved memory handling. CVE-ID CVE-2015-5777 : Apple CVE-2015-5778 : Apple CoreText Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 Impact: Processing a maliciously crafted font file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the processing of font files. This issue was addressed through improved input validation. CVE-ID CVE-2015-5761 : John Villamil (@day6reak), Yahoo Pentest Team CoreText Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Processing a maliciously crafted font file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the processing of font files. This issue was addressed through improved input validation. CVE-ID CVE-2015-5755 : John Villamil (@day6reak), Yahoo Pentest Team curl Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Multiple vulnerabilities in cURL and libcurl prior to 7.38.0, one of which may allow remote attackers to bypass the Same Origin Policy. Description: Multiple vulnerabilities existed in cURL and libcurl prior to 7.38.0. These issues were addressed by updating cURL to version 7.43.0. CVE-ID CVE-2014-3613 CVE-2014-3620 CVE-2014-3707 CVE-2014-8150 CVE-2014-8151 CVE-2015-3143 CVE-2015-3144 CVE-2015-3145 CVE-2015-3148 CVE-2015-3153 Data Detectors Engine Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Processing a sequence of unicode characters can lead to an unexpected application termination or arbitrary code execution Description: Memory corruption issues existed in processing of Unicode characters. These issues were addressed through improved memory handling. CVE-ID CVE-2015-5750 : M1x7e1 of Safeye Team (www.safeye.org) Date & Time pref pane Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Applications that rely on system time may have unexpected behavior Description: An authorization issue existed when modifying the system date and time preferences. This issue was addressed with additional authorization checks. CVE-ID CVE-2015-3757 : Mark S C Smith Dictionary Application Available for: OS X Yosemite v10.10 to v10.10.4 Impact: An attacker with a privileged network position may be able to intercept users' Dictionary app queries Description: An issue existed in the Dictionary app, which did not properly secure user communications. This issue was addressed by moving Dictionary queries to HTTPS. CVE-ID CVE-2015-3774 : Jeffrey Paul of EEQJ, Jan Bee of the Google Security Team DiskImages Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Processing a maliciously crafted DMG file may lead to an unexpected application termination or arbitrary code execution with system privileges Description: A memory corruption issue existed in parsing of malformed DMG images. This issue was addressed through improved memory handling. CVE-ID CVE-2015-3800 : Frank Graziano of the Yahoo Pentest Team dyld Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A local user may be able to execute arbitrary code with system privileges Description: A path validation issue existed in dyld. This was addressed through improved environment sanitization. CVE-ID CVE-2015-3760 : beist of grayhash, Stefan Esser FontParser Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 Impact: Processing a maliciously crafted font file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the processing of font files. This issue was addressed through improved input validation. CVE-ID CVE-2015-3804 : Apple CVE-2015-5775 : Apple FontParser Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 Impact: Processing a maliciously crafted font file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the processing of font files. This issue was addressed through improved input validation. CVE-ID CVE-2015-5756 : John Villamil (@day6reak), Yahoo Pentest Team groff Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Multiple issues in pdfroff Description: Multiple issues existed in pdfroff, the most serious of which may allow arbitrary filesystem modification. These issues were addressed by removing pdfroff. CVE-ID CVE-2009-5044 CVE-2009-5078 ImageIO Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Processing a maliciously crafted TIFF image may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the processing of TIFF images. This issue was addressed through improved bounds checking. CVE-ID CVE-2015-5758 : Apple ImageIO Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Visiting a maliciously crafted website may result in the disclosure of process memory Description: An uninitialized memory access issue existed in ImageIO's handling of PNG and TIFF images. Visiting a malicious website may result in sending data from process memory to the website. This issue is addressed through improved memory initialization and additional validation of PNG and TIFF images. CVE-ID CVE-2015-5781 : Michal Zalewski CVE-2015-5782 : Michal Zalewski Install Framework Legacy Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A malicious application may be able to execute arbitrary code with root privileges Description: An issue existed in how Install.framework's 'runner' binary dropped privileges. This issue was addressed through improved privilege management. CVE-ID CVE-2015-5784 : Ian Beer of Google Project Zero Install Framework Legacy Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A race condition existed in Install.framework's 'runner' binary that resulted in privileges being incorrectly dropped. This issue was addressed through improved object locking. CVE-ID CVE-2015-5754 : Ian Beer of Google Project Zero IOFireWireFamily Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A local user may be able to execute arbitrary code with system privileges Description: Memory corruption issues existed in IOFireWireFamily. These issues were addressed through additional type input validation. CVE-ID CVE-2015-3769 : Ilja van Sprundel CVE-2015-3771 : Ilja van Sprundel CVE-2015-3772 : Ilja van Sprundel IOGraphics Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A memory corruption issue existed in IOGraphics. This issue was addressed through additional type input validation. CVE-ID CVE-2015-3770 : Ilja van Sprundel CVE-2015-5783 : Ilja van Sprundel IOHIDFamily Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A local user may be able to execute arbitrary code with system privileges Description: A buffer overflow issue existed in IOHIDFamily. This issue was addressed through improved memory handling. CVE-ID CVE-2015-5774 : TaiG Jailbreak Team Kernel Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A malicious application may be able to determine kernel memory layout Description: An issue existed in the mach_port_space_info interface, which could have led to the disclosure of kernel memory layout. This was addressed by disabling the mach_port_space_info interface. CVE-ID CVE-2015-3766 : Cererdlong of Alibaba Mobile Security Team, @PanguTeam Kernel Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: An integer overflow existed in the handling of IOKit functions. This issue was addressed through improved validation of IOKit API arguments. CVE-ID CVE-2015-3768 : Ilja van Sprundel Kernel Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A local user may be able to cause a system denial of service Description: A resource exhaustion issue existed in the fasttrap driver. This was addressed through improved memory handling. CVE-ID CVE-2015-5747 : Maxime VILLARD of m00nbsd Kernel Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A local user may be able to cause a system denial of service Description: A validation issue existed in the mounting of HFS volumes. This was addressed by adding additional checks. CVE-ID CVE-2015-5748 : Maxime VILLARD of m00nbsd Kernel Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A malicious application may be able to execute unsigned code Description: An issue existed that allowed unsigned code to be appended to signed code in a specially crafted executable file. This issue was addressed through improved code signature validation. CVE-ID CVE-2015-3806 : TaiG Jailbreak Team Kernel Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A specially crafted executable file could allow unsigned, malicious code to execute Description: An issue existed in the way multi-architecture executable files were evaluated that could have allowed unsigned code to be executed. This issue was addressed through improved validation of executable files. CVE-ID CVE-2015-3803 : TaiG Jailbreak Team Kernel Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A local user may be able to execute unsigned code Description: A validation issue existed in the handling of Mach-O files. This was addressed by adding additional checks. CVE-ID CVE-2015-3802 : TaiG Jailbreak Team CVE-2015-3805 : TaiG Jailbreak Team Kernel Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Parsing a maliciously crafted plist may lead to an unexpected application termination or arbitrary code execution with system privileges Description: A memory corruption existed in processing of malformed plists. This issue was addressed through improved memory handling. CVE-ID CVE-2015-3776 : Teddy Reed of Facebook Security, Patrick Stein (@jollyjinx) of Jinx Germany Kernel Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A local user may be able to execute arbitrary code with system privileges Description: A path validation issue existed. This was addressed through improved environment sanitization. CVE-ID CVE-2015-3761 : Apple Libc Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Processing a maliciously crafted regular expression may lead to an unexpected application termination or arbitrary code execution Description: Memory corruption issues existed in the TRE library. These were addressed through improved memory handling. CVE-ID CVE-2015-3796 : Ian Beer of Google Project Zero CVE-2015-3797 : Ian Beer of Google Project Zero CVE-2015-3798 : Ian Beer of Google Project Zero Libinfo Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 Impact: A remote attacker may be able to cause unexpected application termination or arbitrary code execution Description: Memory corruption issues existed in handling AF_INET6 sockets. These were addressed by improved memory handling. CVE-ID CVE-2015-5776 : Apple libpthread Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A memory corruption issue existed in handling syscalls. This issue was addressed through improved lock state checking. CVE-ID CVE-2015-5757 : Lufeng Li of Qihoo 360 libxml2 Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 Impact: Multiple vulnerabilities existed in libxml2 versions prior to 2.9.2, the most serious of which may allow a remote attacker to cause a denial of service Description: Multiple vulnerabilities existed in libxml2 versions prior to 2.9.2. These were addressed by updating libxml2 to version 2.9.2. CVE-ID CVE-2012-6685 : Felix Groebert of Google CVE-2014-0191 : Felix Groebert of Google libxml2 Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 Impact: Parsing a maliciously crafted XML document may lead to disclosure of user information Description: A memory access issue existed in libxml2. This was addressed by improved memory handling CVE-ID CVE-2014-3660 : Felix Groebert of Google libxml2 Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 Impact: Parsing a maliciously crafted XML document may lead to disclosure of user information Description: A memory corruption issue existed in parsing of XML files. This issue was addressed through improved memory handling. CVE-ID CVE-2015-3807 : Apple libxpc Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A memory corruption issue existed in handling of malformed XPC messages. This issue was improved through improved bounds checking. CVE-ID CVE-2015-3795 : Mathew Rowley mail_cmds Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A local user may be able to execute arbitrary shell commands Description: A validation issue existed in the mailx parsing of email addresses. This was addressed by improved sanitization. CVE-ID CVE-2014-7844 Notification Center OSX Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A malicious application may be able to access all notifications previously displayed to users Description: An issue existed in Notification Center, which did not properly delete user notifications. This issue was addressed by correctly deleting notifications dismissed by users. CVE-ID CVE-2015-3764 : Jonathan Zdziarski ntfs Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A local user may be able to execute arbitrary code with system privileges Description: A memory corruption issue existed in NTFS. This issue was addressed through improved memory handling. CVE-ID CVE-2015-5763 : Roberto Paleari and Aristide Fattori of Emaze Networks OpenSSH Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Remote attackers may be able to circumvent a time delay for failed login attempts and conduct brute-force attacks Description: An issue existed when processing keyboard-interactive devices. This issue was addressed through improved authentication request validation. CVE-ID CVE-2015-5600 OpenSSL Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 Impact: Multiple vulnerabilities existed in OpenSSL versions prior to 0.9.8zg, the most serious of which may allow a remote attacker to cause a denial of service. Description: Multiple vulnerabilities existed in OpenSSL versions prior to 0.9.8zg. These were addressed by updating OpenSSL to version 0.9.8zg. CVE-ID CVE-2015-1788 CVE-2015-1789 CVE-2015-1790 CVE-2015-1791 CVE-2015-1792 perl Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Parsing a maliciously crafted regular expression may lead to disclosure of unexpected application termination or arbitrary code execution Description: An integer underflow issue existed in the way Perl parsed regular expressions. This issue was addressed through improved memory handling. CVE-ID CVE-2013-7422 PostgreSQL Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 Impact: An attacker may be able to cause unexpected application termination or gain access to data without proper authentication Description: Multiple issues existed in PostgreSQL 9.2.4. These issues were addressed by updating PostgreSQL to 9.2.13. CVE-ID CVE-2014-0067 CVE-2014-8161 CVE-2015-0241 CVE-2015-0242 CVE-2015-0243 CVE-2015-0244 python Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Multiple vulnerabilities existed in Python 2.7.6, the most serious of which may lead to arbitrary code execution Description: Multiple vulnerabilities existed in Python versions prior to 2.7.6. These were addressed by updating Python to version 2.7.10. CVE-ID CVE-2013-7040 CVE-2013-7338 CVE-2014-1912 CVE-2014-7185 CVE-2014-9365 QL Office Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 Impact: Parsing a maliciously crafted Office document may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in parsing of Office documents. This issue was addressed through improved memory handling. CVE-ID CVE-2015-5773 : Apple QL Office Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Parsing a maliciously crafted XML file may lead to disclosure of user information Description: An external entity reference issue existed in XML file parsing. This issue was addressed through improved parsing. CVE-ID CVE-2015-3784 : Bruno Morisson of INTEGRITY S.A. Quartz Composer Framework Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 Impact: Parsing a maliciously crafted QuickTime file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in parsing of QuickTime files. This issue was addressed through improved memory handling. CVE-ID CVE-2015-5771 : Apple Quick Look Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Searching for a previously viewed website may launch the web browser and render that website Description: An issue existed where QuickLook had the capability to execute JavaScript. The issue was addressed by disallowing execution of JavaScript. CVE-ID CVE-2015-3781 : Andrew Pouliot of Facebook, Anto Loyola of Qubole QuickTime 7 Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 Impact: Processing a maliciously crafted file may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in QuickTime. These issues were addressed through improved memory handling. CVE-ID CVE-2015-3772 CVE-2015-3779 CVE-2015-5753 : Apple CVE-2015-5779 : Apple QuickTime 7 Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 Impact: Processing a maliciously crafted file may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in QuickTime. These issues were addressed through improved memory handling. CVE-ID CVE-2015-3765 : Joe Burnett of Audio Poison CVE-2015-3788 : Ryan Pentney and Richard Johnson of Cisco Talos CVE-2015-3789 : Ryan Pentney and Richard Johnson of Cisco Talos CVE-2015-3790 : Ryan Pentney and Richard Johnson of Cisco Talos CVE-2015-3791 : Ryan Pentney and Richard Johnson of Cisco Talos CVE-2015-3792 : Ryan Pentney and Richard Johnson of Cisco Talos CVE-2015-5751 : WalkerFuz SceneKit Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Viewing a maliciously crafted Collada file may lead to arbitrary code execution Description: A heap buffer overflow existed in SceneKit's handling of Collada files. This issue was addressed through improved input validation. CVE-ID CVE-2015-5772 : Apple SceneKit Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 Impact: A remote attacker may be able to cause unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in SceneKit. This issue was addressed through improved memory handling. CVE-ID CVE-2015-3783 : Haris Andrianakis of Google Security Team Security Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A standard user may be able to gain access to admin privileges without proper authentication Description: An issue existed in handling of user authentication. This issue was addressed through improved authentication checks. CVE-ID CVE-2015-3775 : [Eldon Ahrold] SMBClient Available for: OS X Yosemite v10.10 to v10.10.4 Impact: A remote attacker may be able to cause unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the SMB client. This issue was addressed through improved memory handling. CVE-ID CVE-2015-3773 : Ilja van Sprundel Speech UI Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Parsing a maliciously crafted unicode string with speech alerts enabled may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in handling of Unicode strings. This issue was addressed by improved memory handling. CVE-ID CVE-2015-3794 : Adam Greenbaum of Refinitive sudo Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Multiple vulnerabilities existed in sudo versions prior to 1.7.10p9, the most serious of which may allow an attacker access to arbitrary files Description: Multiple vulnerabilities existed in sudo versions prior to 1.7.10p9. These were addressed by updating sudo to version 1.7.10p9. CVE-ID CVE-2013-1775 CVE-2013-1776 CVE-2013-2776 CVE-2013-2777 CVE-2014-0106 CVE-2014-9680 tcpdump Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Multiple vulnerabilities existed in tcpdump 4.7.3, the most serious of which may allow a remote attacker to cause a denial of service. Description: Multiple vulnerabilities existed in tcpdump versions prior to 4.7.3. These were addressed by updating tcpdump to version 4.7.3. CVE-ID CVE-2014-8767 CVE-2014-8769 CVE-2014-9140 Text Formats Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Parsing a maliciously crafted text file may lead to disclosure of user information Description: An XML external entity reference issue existed with TextEdit parsing. This issue was addressed through improved parsing. CVE-ID CVE-2015-3762 : Xiaoyong Wu of the Evernote Security Team udf Available for: OS X Yosemite v10.10 to v10.10.4 Impact: Processing a maliciously crafted DMG file may lead to an unexpected application termination or arbitrary code execution with system privileges Description: A memory corruption issue existed in parsing of malformed DMG images. This issue was addressed through improved memory handling. CVE-ID CVE-2015-3767 : beist of grayhash OS X Yosemite v10.10.5 includes the security content of Safari 8.0.8: https://support.apple.com/en-us/HT205033 OS X Yosemite 10.10.5 and Security Update 2015-006 may be obtained from the Mac App Store or Apple's Software Downloads web site: http://www.apple.com/support/downloads/ Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQIcBAEBCAAGBQJVzM3+AAoJEBcWfLTuOo7tx/YP/RTsUUx0UTk7rXj6AEcHmiR4 Y2xTUOXqRmxhieSbsGK9laKL5++lIzkGh5RC7oYag0+OgWtZz+EU/EtdoEJmGNJ6 +PgoEnizYdKhO1kos1KCHOwG6UFCqoeEm6Icm33nVUqWp7uAmhVRMRxtMJEScLSR 2LpsK0grIhFXtJGqu053TSKSCa1UTab8XWteZTT84uFGMSKbAFONj5CPIrR6+uev QpVTwrnskPDBOXJwGhjypvIBTbt2aa1wjCukOAWFHwf7Pma/QUdhKRkUK4vAb9/k fu2t2fBOvSMguJHRO+340NsQR9LvmdruBeAyNUH64srF1jtbAg0QnvZsPyO5aIyR A8WrzHl3oIc0II0y7VpI+3o0J3Nn03EcBPtIKeoeyznnjNziDm72HPI2d2+5ZSRz xjAd4Nmw+dgGq+UMkusIXgtRK4HcEpwzfImf3zqnKHakSncnFPhGKyNEgn8bK9a7 AeAvSqMXXsJg8weHUF2NLnAn/42k2wIE8d5BOLaIy13xz6MJn7VUI21pK0zCaGBF sfkRFZP0eEVh8ZzU/nWp9E5KDpbsd72biJwvjWH4OrmkfzUWxStQiVwPTxtZD9LW c5ZWe+vqZJV9eYRH2hAOMPaYkOQ5Z4DySNVVOFAG0eq9til8+V0k3L7ipIVd2XUB msu6gVP8uZhFYNb8byVJ =+0e/ -----END PGP SIGNATURE----- . For the unstable distribution (sid), these problems have been fixed in version 9.3.3-1 of the postgresql-9.3 package. CVE-ID CVE-2015-5911 : Zachary Jones of WhiteHat Security Threat Research Center OS X Server 5.0.3 may be obtained from the Mac App Store. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2015:110 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : postgresql Date : March 29, 2015 Affected: Business Server 2.0 _______________________________________________________________________ Problem Description: Updated postgresql packages fix multiple security vulnerabilities: Granting a role without ADMIN OPTION is supposed to prevent the grantee from adding or removing members from the granted role, but this restriction was easily bypassed by doing SET ROLE first. The security impact is mostly that a role member can revoke the access of others, contrary to the wishes of his grantor. Unapproved role member additions are a lesser concern, since an uncooperative role member could provide most of his rights to others anyway by creating views or SECURITY DEFINER functions (CVE-2014-0060). The primary role of PL validator functions is to be called implicitly during CREATE FUNCTION, but they are also normal SQL functions that a user can call explicitly. Calling a validator on a function actually written in some other language was not checked for and could be exploited for privilege-escalation purposes. The fix involves adding a call to a privilege-checking function in each validator function. Non-core procedural languages will also need to make this change to their own validator functions, if any (CVE-2014-0061). If the name lookups come to different conclusions due to concurrent activity, we might perform some parts of the DDL on a different table than other parts. At least in the case of CREATE INDEX, this can be used to cause the permissions checks to be performed against a different table than the index creation, allowing for a privilege escalation attack (CVE-2014-0062). The MAXDATELEN constant was too small for the longest possible value of type interval, allowing a buffer overrun in interval_out(). Although the datetime input functions were more careful about avoiding buffer overrun, the limit was short enough to cause them to reject some valid inputs, such as input containing a very long timezone name. The ecpg library contained these vulnerabilities along with some of its own (CVE-2014-0063). Several functions, mostly type input functions, calculated an allocation size without checking for overflow. If overflow did occur, a too-small buffer would be allocated and then written past (CVE-2014-0064). Use strlcpy() and related functions to provide a clear guarantee that fixed-size buffers are not overrun. Unlike the preceding items, it is unclear whether these cases really represent live issues, since in most cases there appear to be previous constraints on the size of the input string. Nonetheless it seems prudent to silence all Coverity warnings of this type (CVE-2014-0065). There are relatively few scenarios in which crypt() could return NULL, but contrib/chkpass would crash if it did. One practical case in which this could be an issue is if libc is configured to refuse to execute unapproved hashing algorithms (e.g., FIPS mode) (CVE-2014-0066). Since the temporary server started by make check uses trust authentication, another user on the same machine could connect to it as database superuser, and then potentially exploit the privileges of the operating-system user who started the tests. A future release will probably incorporate changes in the testing procedure to prevent this risk, but some public discussion is needed first. So for the moment, just warn people against using make check when there are untrusted users on the same machine (CVE-2014-0067). A user with limited clearance on a table might have access to information in columns without SELECT rights on through server error messages (CVE-2014-8161). The function to_char() might read/write past the end of a buffer. This might crash the server when a formatting template is processed (CVE-2015-0241). The pgcrypto module is vulnerable to stack buffer overrun that might crash the server (CVE-2015-0243). Emil Lenngren reported that an attacker can inject SQL commands when the synchronization between client and server is lost (CVE-2015-0244). _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0060 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0061 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0062 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0063 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0064 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0065 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0066 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0067 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8161 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0241 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0242 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0243 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0244 http://advisories.mageia.org/MGASA-2014-0205.html http://advisories.mageia.org/MGASA-2015-0069.html _______________________________________________________________________ Updated Packages: Mandriva Business Server 2/X86_64: f99a635c6f82735fbc2b95e152f09efb mbs2/x86_64/lib64ecpg9.2_6-9.2.10-1.mbs2.x86_64.rpm d57166faca3e9d1b932cdd43c04b4d3a mbs2/x86_64/lib64ecpg9.3_6-9.3.6-1.mbs2.x86_64.rpm 6e4f38d6fb5b9bb91e9f2eab3e567e1f mbs2/x86_64/lib64pq9.2_5.5-9.2.10-1.mbs2.x86_64.rpm 6671c3cf6916cf829c3e3bc0332190a7 mbs2/x86_64/lib64pq9.3_5-9.3.6-1.mbs2.x86_64.rpm eda79e884356acdd4bc3776eb9f082d7 mbs2/x86_64/postgresql9.2-9.2.10-1.mbs2.x86_64.rpm 78ed2566f404f6af31337690f52851ca mbs2/x86_64/postgresql9.2-contrib-9.2.10-1.mbs2.x86_64.rpm 153a4a063504fa1fa1842b127712bfe0 mbs2/x86_64/postgresql9.2-devel-9.2.10-1.mbs2.x86_64.rpm 9bfdccf6a88c6b13496c7da4de2bca34 mbs2/x86_64/postgresql9.2-docs-9.2.10-1.mbs2.noarch.rpm 6b76f8d61fd457f92d90b1959fb1dea3 mbs2/x86_64/postgresql9.2-pl-9.2.10-1.mbs2.x86_64.rpm 8526ab569ed5362fc7a92fa23dca98b6 mbs2/x86_64/postgresql9.2-plperl-9.2.10-1.mbs2.x86_64.rpm 412cb6f09cb609fcbb09d3259f534dfc mbs2/x86_64/postgresql9.2-plpgsql-9.2.10-1.mbs2.x86_64.rpm c95ce4440833dfc828c9ee8eecbcea17 mbs2/x86_64/postgresql9.2-plpython-9.2.10-1.mbs2.x86_64.rpm 50b9c0b0197667b390ba47ccd00770d4 mbs2/x86_64/postgresql9.2-pltcl-9.2.10-1.mbs2.x86_64.rpm c019e6c9930eafc094f287ee7461aaaa mbs2/x86_64/postgresql9.2-server-9.2.10-1.mbs2.x86_64.rpm d2a51e59c752f3ddb3ea6c77f7502433 mbs2/x86_64/postgresql9.3-9.3.6-1.mbs2.x86_64.rpm 60e543ac5e51171e6669e68b0a5a2eb3 mbs2/x86_64/postgresql9.3-contrib-9.3.6-1.mbs2.x86_64.rpm 483126b5d66cd0f375ec9732677b2808 mbs2/x86_64/postgresql9.3-devel-9.3.6-1.mbs2.x86_64.rpm 0b361bfcbc87273de585f3f9c4c6a618 mbs2/x86_64/postgresql9.3-docs-9.3.6-1.mbs2.noarch.rpm 357b9a02ee0271876013e2db04025721 mbs2/x86_64/postgresql9.3-pl-9.3.6-1.mbs2.x86_64.rpm 7bd4f962c795ee04836f1e162c1e6b7e mbs2/x86_64/postgresql9.3-plperl-9.3.6-1.mbs2.x86_64.rpm 66e4b7668e00e0d16d6570ea7f1651fa mbs2/x86_64/postgresql9.3-plpgsql-9.3.6-1.mbs2.x86_64.rpm 13e4930b5a0dbe06a5b886a83401470a mbs2/x86_64/postgresql9.3-plpython-9.3.6-1.mbs2.x86_64.rpm 32e568d9ba610c58e6587b04d4cdb6ab mbs2/x86_64/postgresql9.3-pltcl-9.3.6-1.mbs2.x86_64.rpm 0b8899321e95fd17fc6aa954fb450a0d mbs2/x86_64/postgresql9.3-server-9.3.6-1.mbs2.x86_64.rpm f5856e921124345cf4dbadd41bfaab9d mbs2/SRPMS/postgresql9.2-9.2.10-1.mbs2.src.rpm ca1994bd36f7310b82ec57914dd8496d mbs2/SRPMS/postgresql9.3-9.3.6-1.mbs2.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security

Trust: 2.61

sources: NVD: CVE-2014-0067 // JVNDB: JVNDB-2014-001850 // BID: 65721 // VULHUB: VHN-67560 // VULMON: CVE-2014-0067 // PACKETSTORM: 133079 // PACKETSTORM: 125341 // PACKETSTORM: 125321 // PACKETSTORM: 125319 // PACKETSTORM: 133619 // PACKETSTORM: 131120

AFFECTED PRODUCTS

vendor:postgresqlmodel:postgresqlscope:eqversion:9.3

Trust: 1.9

vendor:postgresqlmodel:postgresqlscope:eqversion:9.2

Trust: 1.9

vendor:postgresqlmodel:postgresqlscope:eqversion:9.3.1

Trust: 1.6

vendor:postgresqlmodel:postgresqlscope:eqversion:9.2.4

Trust: 1.6

vendor:postgresqlmodel:postgresqlscope:eqversion:9.2.3

Trust: 1.6

vendor:postgresqlmodel:postgresqlscope:eqversion:9.2.2

Trust: 1.6

vendor:postgresqlmodel:postgresqlscope:eqversion:9.3.2

Trust: 1.6

vendor:postgresqlmodel:postgresqlscope:eqversion:9.2.1

Trust: 1.6

vendor:postgresqlmodel:postgresqlscope:eqversion:9.2.5

Trust: 1.6

vendor:postgresqlmodel:postgresqlscope:eqversion:9.2.6

Trust: 1.6

vendor:postgresqlmodel:postgresqlscope:eqversion:9.0

Trust: 1.3

vendor:postgresqlmodel:postgresqlscope:eqversion:9.1

Trust: 1.3

vendor:postgresqlmodel:postgresqlscope:eqversion:9.0.12

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:8.4.2

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:8.4.10

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:lteversion:8.4.19

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:8.4.15

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:8.4.17

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:9.0.6

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:8.4.7

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:5.0.3

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:9.1.4

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:9.1.3

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:8.4.8

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:8.4.3

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:9.0.8

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:9.1.1

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:9.0.13

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:9.0.5

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:8.4.18

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:8.4.9

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:8.4.13

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:8.4.5

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:9.0.2

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:8.4.6

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:9.0.11

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.10.4

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:9.0.15

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:9.1.9

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:8.4.1

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:9.0.4

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:9.0.1

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:8.4.16

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:9.1.7

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:9.1.8

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:8.4.4

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:8.4.11

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:9.0.9

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:8.4.14

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:9.1.11

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:9.1.2

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:9.0.14

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:9.1.10

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:9.0.10

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:8.4.12

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:9.0.3

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:9.1.6

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:9.1.5

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:eqversion:9.0.7

Trust: 1.0

vendor:postgresqlmodel:postgresqlscope:lteversion:9.3.3

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.10 to 10.10.4

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.8.5

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.9.5

Trust: 0.8

vendor:applemodel:macos serverscope:ltversion:5.0.3 (os x yosemite v10.10.5 or later )

Trust: 0.8

vendor:s u s emodel:opensusescope:eqversion:11.4

Trust: 0.3

vendor:postgresqlmodel:postgresqlscope:eqversion:8.4

Trust: 0.3

vendor:mandrivamodel:business serverscope:eqversion:1x8664

Trust: 0.3

vendor:mandrivamodel:business serverscope:eqversion:1

Trust: 0.3

vendor:junipermodel:security threat response managerscope:eqversion:2012.1

Trust: 0.3

vendor:ibmmodel:tivoli business service managerscope:eqversion:4.2.1

Trust: 0.3

vendor:ibmmodel:tivoli business service managerscope:eqversion:4.2

Trust: 0.3

vendor:ibmmodel:qradar security information and event manager mr5scope:eqversion:7.0

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x4.1.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x3.2.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x3.2.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x3.1.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x4.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x4.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x3.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x3.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.10.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.9.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.8.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.10.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.10.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.10.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.10.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.10

Trust: 0.3

vendor:junipermodel:security threat response manager 2012.1r8scope:neversion: -

Trust: 0.3

vendor:applemodel:mac os serverscope:neversion:x5.0.3

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.10.5

Trust: 0.3

sources: BID: 65721 // JVNDB: JVNDB-2014-001850 // CNNVD: CNNVD-201403-587 // NVD: CVE-2014-0067

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-0067
value: MEDIUM

Trust: 1.0

NVD: CVE-2014-0067
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201403-587
value: MEDIUM

Trust: 0.6

VULHUB: VHN-67560
value: MEDIUM

Trust: 0.1

VULMON: CVE-2014-0067
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2014-0067
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-67560
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-67560 // VULMON: CVE-2014-0067 // JVNDB: JVNDB-2014-001850 // CNNVD: CNNVD-201403-587 // NVD: CVE-2014-0067

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-67560 // JVNDB: JVNDB-2014-001850 // NVD: CVE-2014-0067

THREAT TYPE

local

Trust: 0.9

sources: BID: 65721 // CNNVD: CNNVD-201403-587

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201403-587

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-001850

PATCH

title:APPLE-SA-2015-08-13-2 OS X Yosemite v10.10.5 and Security Update 2015-006url:http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html

Trust: 0.8

title:APPLE-SA-2015-09-16-4 OS X Server 5.0.3url:http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html

Trust: 0.8

title:HT205031url:https://support.apple.com/en-us/HT205031

Trust: 0.8

title:HT205219url:https://support.apple.com/en-us/HT205219

Trust: 0.8

title:HT205219url:http://support.apple.com/ja-jp/HT205219

Trust: 0.8

title:HT205031url:https://support.apple.com/ja-jp/HT205031

Trust: 0.8

title:PostgreSQL 9.3.3, 9.2.7, 9.1.12, 9.0.16 and 8.4.20 released!url:http://www.postgresql.org/about/news/1506/

Trust: 0.8

title:Security Informationurl:http://www.postgresql.org/support/security/

Trust: 0.8

title:2014-02-20 Consolidated Security Updateurl:http://wiki.postgresql.org/wiki/20140220securityrelease

Trust: 0.8

title:Bug 1065863url:https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-0067

Trust: 0.8

title:Red Hat: CVE-2014-0067url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2014-0067

Trust: 0.1

title:Debian Security Advisories: DSA-2864-1 postgresql-8.4 -- several vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=381da60c2b1339b05afc77c669c7ce7b

Trust: 0.1

title:Debian Security Advisories: DSA-2865-1 postgresql-9.1 -- several vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=4b77f25b0fdd73a587012b7098bd8577

Trust: 0.1

title:Amazon Linux AMI: ALAS-2015-492url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2015-492

Trust: 0.1

title: - url:https://github.com/DButter/whitehat_public

Trust: 0.1

sources: VULMON: CVE-2014-0067 // JVNDB: JVNDB-2014-001850

EXTERNAL IDS

db:NVDid:CVE-2014-0067

Trust: 3.5

db:BIDid:65721

Trust: 1.5

db:JVNid:JVNVU99970459

Trust: 0.8

db:JVNDBid:JVNDB-2014-001850

Trust: 0.8

db:DEBIANid:DSA-2864

Trust: 0.6

db:DEBIANid:DSA-2865

Trust: 0.6

db:SECUNIAid:56943

Trust: 0.6

db:SECUNIAid:57322

Trust: 0.6

db:SECUNIAid:57122

Trust: 0.6

db:SECUNIAid:57416

Trust: 0.6

db:CNNVDid:CNNVD-201403-587

Trust: 0.6

db:SEEBUGid:SSVID-61544

Trust: 0.1

db:VULHUBid:VHN-67560

Trust: 0.1

db:VULMONid:CVE-2014-0067

Trust: 0.1

db:PACKETSTORMid:133079

Trust: 0.1

db:PACKETSTORMid:125341

Trust: 0.1

db:PACKETSTORMid:125321

Trust: 0.1

db:PACKETSTORMid:125319

Trust: 0.1

db:PACKETSTORMid:133619

Trust: 0.1

db:PACKETSTORMid:131120

Trust: 0.1

sources: VULHUB: VHN-67560 // VULMON: CVE-2014-0067 // BID: 65721 // JVNDB: JVNDB-2014-001850 // PACKETSTORM: 133079 // PACKETSTORM: 125341 // PACKETSTORM: 125321 // PACKETSTORM: 125319 // PACKETSTORM: 133619 // PACKETSTORM: 131120 // CNNVD: CNNVD-201403-587 // NVD: CVE-2014-0067

REFERENCES

url:http://www.debian.org/security/2014/dsa-2864

Trust: 1.8

url:http://www.debian.org/security/2014/dsa-2865

Trust: 1.8

url:http://wiki.postgresql.org/wiki/20140220securityrelease

Trust: 1.8

url:http://www.postgresql.org/about/news/1506/

Trust: 1.8

url:http://www.securityfocus.com/bid/65721

Trust: 1.3

url:http://lists.apple.com/archives/security-announce/2015/aug/msg00001.html

Trust: 1.2

url:http://lists.apple.com/archives/security-announce/2015/sep/msg00004.html

Trust: 1.2

url:https://support.apple.com/ht205219

Trust: 1.2

url:https://support.apple.com/kb/ht205031

Trust: 1.2

url:http://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html

Trust: 1.2

url:http://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0067

Trust: 1.0

url:http://jvn.jp/vu/jvnvu99970459/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-0067

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2014-0067

Trust: 0.6

url:http://secunia.com/advisories/56943

Trust: 0.6

url:http://secunia.com/advisories/57122

Trust: 0.6

url:http://secunia.com/advisories/57322

Trust: 0.6

url:http://secunia.com/advisories/57416

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2014-0064

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2014-0063

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2014-0061

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2014-0066

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2014-0062

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2014-0060

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2014-0065

Trust: 0.4

url:http://www.postgresql.org/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-8161

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-8109

Trust: 0.2

url:https://support.apple.com/kb/ht201222

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-3583

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-3581

Trust: 0.2

url:https://www.apple.com/support/security/pgp/

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0066

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0064

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0062

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0065

Trust: 0.2

url:http://www.mandriva.com/en/support/security/

Trust: 0.2

url:http://www.mandriva.com/en/support/security/advisories/

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0060

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0061

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0063

Trust: 0.2

url:http://www.debian.org/security/faq

Trust: 0.2

url:http://www.debian.org/security/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-0242

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-0241

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-0243

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-0244

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/264.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2014-0067

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1775

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3613

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-7185

Trust: 0.1

url:https://support.apple.com/en-us/ht205033

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2776

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-7422

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-8767

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-5044

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3620

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2777

Trust: 0.1

url:http://www.apple.com/support/downloads/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-7844

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0106

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1776

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-8769

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-7338

Trust: 0.1

url:https://www.safeye.org)

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3707

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0191

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-5078

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-7040

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-6685

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-8150

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-8151

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3660

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1912

Trust: 0.1

url:http://www.postgresql.org/docs/9.2/static/release-9-2-6.html

Trust: 0.1

url:http://www.postgresql.org/docs/9.2/static/release-9-2-5.html

Trust: 0.1

url:http://www.postgresql.org/docs/9.2/static/release-9-2-7.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3185

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-8500

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0253

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3183

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1349

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0228

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5911

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3166

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3165

Trust: 0.1

url:http://gpgtools.org

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5704

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3167

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0242

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0244

Trust: 0.1

url:http://advisories.mageia.org/mgasa-2014-0205.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-8161

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0241

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0243

Trust: 0.1

url:http://advisories.mageia.org/mgasa-2015-0069.html

Trust: 0.1

sources: VULHUB: VHN-67560 // VULMON: CVE-2014-0067 // BID: 65721 // JVNDB: JVNDB-2014-001850 // PACKETSTORM: 133079 // PACKETSTORM: 125341 // PACKETSTORM: 125321 // PACKETSTORM: 125319 // PACKETSTORM: 133619 // PACKETSTORM: 131120 // CNNVD: CNNVD-201403-587 // NVD: CVE-2014-0067

CREDITS

Noah Misch

Trust: 0.3

sources: BID: 65721

SOURCES

db:VULHUBid:VHN-67560
db:VULMONid:CVE-2014-0067
db:BIDid:65721
db:JVNDBid:JVNDB-2014-001850
db:PACKETSTORMid:133079
db:PACKETSTORMid:125341
db:PACKETSTORMid:125321
db:PACKETSTORMid:125319
db:PACKETSTORMid:133619
db:PACKETSTORMid:131120
db:CNNVDid:CNNVD-201403-587
db:NVDid:CVE-2014-0067

LAST UPDATE DATE

2024-08-14T12:27:04.310000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-67560date:2017-12-16T00:00:00
db:VULMONid:CVE-2014-0067date:2017-12-16T00:00:00
db:BIDid:65721date:2015-11-03T19:43:00
db:JVNDBid:JVNDB-2014-001850date:2015-10-05T00:00:00
db:CNNVDid:CNNVD-201403-587date:2014-04-01T00:00:00
db:NVDid:CVE-2014-0067date:2017-12-16T02:29:02.150

SOURCES RELEASE DATE

db:VULHUBid:VHN-67560date:2014-03-31T00:00:00
db:VULMONid:CVE-2014-0067date:2014-03-31T00:00:00
db:BIDid:65721date:2014-02-17T00:00:00
db:JVNDBid:JVNDB-2014-001850date:2014-04-01T00:00:00
db:PACKETSTORMid:133079date:2015-08-13T22:15:27
db:PACKETSTORMid:125341date:2014-02-22T03:39:19
db:PACKETSTORMid:125321date:2014-02-21T06:21:40
db:PACKETSTORMid:125319date:2014-02-21T06:21:19
db:PACKETSTORMid:133619date:2015-09-19T15:37:27
db:PACKETSTORMid:131120date:2015-03-30T21:34:58
db:CNNVDid:CNNVD-201403-587date:2014-03-31T00:00:00
db:NVDid:CVE-2014-0067date:2014-03-31T14:58:15.787