Check Point Reference: | CPAI-2017-0722 |
Date Published: | 29 Aug 2017 |
Severity: | High |
Last Updated: | Sunday 17 September, 2017 |
Source: | PostgreSQL Global Development Group |
Industry Reference: | CVE-2017-7546 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | PostgreSQL PostgreSQL 9.2.x prior to 9.2.22 PostgreSQL PostgreSQL 9.3.x prior to 9.3.18 PostgreSQL PostgreSQL 9.4.x prior to 9.4.13 PostgreSQL PostgreSQL 9.5.x prior to 9.5.8 PostgreSQL PostgreSQL 9.6.x prior to 9.6.4 |
Vulnerability Description | A security policy bypass vulnerability exists in the core server component of the PostgreSQL database server. The vulnerability is due to improper authentication of user accounts with empty passwords for clients that do not use libpq. A remote attacker could send maliciously crafted requests to a vulnerable server. |
This protection detects attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Application Servers Protection Violation.
Attack Information: PostgreSQL Database Core Server non-libpq Client Policy Bypass