Vulnerability Details : CVE-2007-3278
PostgreSQL 8.1 and probably later versions, when local trust authentication is enabled and the Database Link library (dblink) is installed, allows remote attackers to access arbitrary accounts and execute arbitrary SQL queries via a dblink host parameter that proxies the connection from 127.0.0.1.
Products affected by CVE-2007-3278
- cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
Threat overview for CVE-2007-3278
Top countries where our scanners detected CVE-2007-3278
Top open port discovered on systems with this issue
5432
IPs affected by CVE-2007-3278 4,645
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2007-3278!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2007-3278
0.31%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 71 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2007-3278
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.9
|
MEDIUM | AV:L/AC:M/Au:N/C:C/I:C/A:C |
3.4
|
10.0
|
NIST |
CWE ids for CVE-2007-3278
-
Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2007-3278
-
Red Hat 2008-02-01Red Hat does not consider this do be a security issue. dblink is disabled in default configuration of PostgreSQL packages as shipped with Red Hat Enterprise Linux versions 2.1, 3, 4 and 5, and it is a configuration decision whether to grant local users arbitrary access. Fixes to correct this bug were included in PostgreSQL updates: http:rhn.redhat.comcveCVE-2007-3278.html
References for CVE-2007-3278
-
http://www.vupen.com/english/advisories/2008/0109
Permissions Required
-
http://www.portcullis.co.uk/uplds/whitepapers/Having_Fun_With_PostgreSQL.pdf
Third Party Advisory
-
http://www.securityfocus.com/archive/1/471644/100/0/threaded
Third Party Advisory;VDB Entry
-
http://www.redhat.com/support/errata/RHSA-2008-0040.html
Third Party Advisory
-
http://www.debian.org/security/2008/dsa-1460
Third Party Advisory
-
http://www.debian.org/security/2008/dsa-1463
Third Party Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10334
Third Party Advisory
-
http://www.redhat.com/support/errata/RHSA-2008-0038.html
Third Party Advisory
-
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200559-1
Broken Link
-
http://www.redhat.com/support/errata/RHSA-2008-0039.html
Third Party Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/35142
Third Party Advisory;VDB Entry
-
http://security.gentoo.org/glsa/glsa-200801-15.xml
Third Party Advisory
-
http://www.mandriva.com/security/advisories?name=MDKSA-2007:188
Third Party Advisory
-
http://www.leidecker.info/pgshell/Having_Fun_With_PostgreSQL.txt
Third Party Advisory
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103197-1
Broken Link
-
http://www.vupen.com/english/advisories/2008/1071/references
Permissions Required
-
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01420154
Third Party Advisory
-
https://usn.ubuntu.com/568-1/
Third Party Advisory
-
http://www.securityfocus.com/archive/1/471541/100/0/threaded
Third Party Advisory;VDB Entry
Jump to