TUCoPS :: Web :: Apps :: sql2.htm

PostgreSQL plaintext password
Vulnerability

    PostgreSQL RPM's permission

Affected

    PostgreSQL

Description

    Lamar Owen found following.  He  as the maintainer of the RPM  set
    for PostgreSQL  made the  following announcement  about a security
    vulnerability in the RPM  installation of PostgreSQL available  to
    any local user  of the machine  running the 'postmaster'  process.
    This vulnerability only involves PostgreSQL connection  passwords.
    The  backend  process  creates  a  flat-file copy of the pg_shadow
    username  and  password  database  called  'pg_pwd'  --  due to an
    internal error this  file is created  mode '666'.   This in itself
    is not good -- but the  directory that this file resides in  is by
    default mode '700', so it is not in itself a hole (although it  is
    being fixed for version 7.0).

    HOWEVER,  the  RPM  distribution  up  to  version  6.5.3-1 had the
    directory  (/var/lib/pgsql)  in  a  highly  insecure  mode   '755'
    condition.

Solution

    The latest RPMS available at:

        http://www.ramifordistat.net/postgres

    fix this to mode '700'.  The quick fix is to

        chmod 700 /var/lib/pgsql

    If this chmod is not done, or the new RPM not installed, any local
    user is able to read  the pg_pwd file -- which  contains plaintext
    username/password pairs.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH