Show plain JSON{"id": "CVE-2013-1901", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "authentication": "SINGLE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2013-04-04T17:55:00.923", "references": [{"url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html", "source": "secalert@redhat.com"}, {"url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html", "source": "secalert@redhat.com"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101519.html", "source": "secalert@redhat.com"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102806.html", "source": "secalert@redhat.com"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00007.html", "source": "secalert@redhat.com"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00008.html", "source": "secalert@redhat.com"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00011.html", "source": "secalert@redhat.com"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00012.html", "source": "secalert@redhat.com"}, {"url": "http://support.apple.com/kb/HT5880", "source": "secalert@redhat.com"}, {"url": "http://support.apple.com/kb/HT5892", "source": "secalert@redhat.com"}, {"url": "http://www.debian.org/security/2013/dsa-2658", "source": "secalert@redhat.com"}, {"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:142", "source": "secalert@redhat.com"}, {"url": "http://www.postgresql.org/about/news/1456/", "tags": ["Vendor Advisory"], "source": "secalert@redhat.com"}, {"url": "http://www.postgresql.org/docs/current/static/release-9-1-9.html", "source": "secalert@redhat.com"}, {"url": "http://www.postgresql.org/docs/current/static/release-9-2-4.html", "source": "secalert@redhat.com"}, {"url": "http://www.ubuntu.com/usn/USN-1789-1", "source": "secalert@redhat.com"}, {"url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101519.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102806.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00007.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00008.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00011.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00012.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://support.apple.com/kb/HT5880", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://support.apple.com/kb/HT5892", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.debian.org/security/2013/dsa-2658", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:142", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.postgresql.org/about/news/1456/", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.postgresql.org/docs/current/static/release-9-1-9.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.postgresql.org/docs/current/static/release-9-2-4.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.ubuntu.com/usn/USN-1789-1", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-264"}]}], "descriptions": [{"lang": "en", "value": "PostgreSQL 9.2.x before 9.2.4 and 9.1.x before 9.1.9 does not properly check REPLICATION privileges, which allows remote authenticated users to bypass intended backup restrictions by calling the (1) pg_start_backup or (2) pg_stop_backup functions."}, {"lang": "es", "value": "PostgreSQL v9.2.x anterior a v9.2.4, v9.1.x anterior a v9.1.9 no comprueba correctamente los privilegios de \"REPLICATION\", lo que permite a usuarios remotos autenticados para eludir restricciones de seguridad destinados a la llamada (1) pg_start_backup o las funciones (2) pg_stop_backup."}], "lastModified": "2024-11-21T01:50:37.177", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD27648F-E2FF-4779-97F9-2632DCC6B16D"}, {"criteria": "cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CEFB4916-8B59-4534-804C-CF9DA1B18508"}, {"criteria": "cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3413A3AB-45A3-48E1-9B30-1194C4E7D49D"}, {"criteria": "cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5760CE83-4802-42A0-9338-E1E634882450"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4796DBEC-FF4F-4749-90D5-AD83D8B5E086"}, {"criteria": "cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "79108278-D644-4506-BD9C-F464C6E817B7"}, {"criteria": "cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10CF0AA0-41CD-4D50-BA7A-BF8846115C95"}, {"criteria": "cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "965E1A9D-BB23-4C0B-A9CA-54A1855055B1"}, {"criteria": "cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A1F37C66-0AFE-4D59-8867-BDBCE656774E"}, {"criteria": "cpe:2.3:a:postgresql:postgresql:9.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5CE53AE6-232C-4068-98D1-7749007C3CFD"}, {"criteria": "cpe:2.3:a:postgresql:postgresql:9.1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FFD38139-FD17-41E7-8D10-7731D8203CFC"}, {"criteria": "cpe:2.3:a:postgresql:postgresql:9.1.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CCC0B41F-38FF-4D41-9E31-D666A84BB2FC"}, {"criteria": "cpe:2.3:a:postgresql:postgresql:9.1.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A591CB08-5CEB-45EB-876F-417DCD60AF53"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D6DFE2D3-46E2-4D0C-8508-30307D654560"}, {"criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7118F616-25CA-4E34-AA13-4D14BB62419F"}, {"criteria": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E4174F4F-149E-41A6-BBCC-D01114C05F38"}, {"criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F5D324C4-97C7-49D3-A809-9EAD4B690C69"}, {"criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE"}], "operator": "OR"}]}], "evaluatorImpact": "Per http://www.ubuntu.com/usn/USN-1789-1/\r\n\"A security issue affects these releases of Ubuntu and its derivatives:\r\n\r\nUbuntu 12.10\r\nUbuntu 12.04 LTS\r\nUbuntu 11.10\r\nUbuntu 10.04 LTS\r\nUbuntu 8.04 LTS\"", "sourceIdentifier": "secalert@redhat.com"}