Vulnerability Details : CVE-2017-12172
PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, 9.5.x before 9.5.10, 9.4.x before 9.4.15, 9.3.x before 9.3.20, and 9.2.x before 9.2.24 runs under a non-root operating system account, and database superusers have effective ability to run arbitrary code under that system account. PostgreSQL provides a script for starting the database server during system boot. Packages of PostgreSQL for many operating systems provide their own, packager-authored startup implementations. Several implementations use a log file name that the database superuser can replace with a symbolic link. As root, they open(), chmod() and/or chown() this log file name. This often suffices for the database superuser to escalate to root privileges when root starts the server.
Products affected by CVE-2017-12172
- cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.2.10:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.2.9:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.2.12:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.2.13:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.2.11:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.2.14:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.2.16:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.2.15:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.2.17:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.2.23:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.2.22:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.2.21:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.2.20:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.2.18:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.2.19:*:*:*:*:*:*:*
Threat overview for CVE-2017-12172
Top countries where our scanners detected CVE-2017-12172
Top open port discovered on systems with this issue
5432
IPs affected by CVE-2017-12172 212,879
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2017-12172!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2017-12172
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 25 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-12172
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST | |
6.7
|
MEDIUM | CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
0.8
|
5.9
|
NIST |
CWE ids for CVE-2017-12172
-
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.Assigned by:
- nvd@nist.gov (Primary)
- secalert@redhat.com (Secondary)
References for CVE-2017-12172
-
https://access.redhat.com/errata/RHSA-2017:3404
RHSA-2017:3404 - Security Advisory - Red Hat Customer PortalIssue Tracking;Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2017:3403
RHSA-2017:3403 - Security Advisory - Red Hat Customer PortalIssue Tracking;Third Party Advisory
-
http://www.securitytracker.com/id/1039752
PostgreSQL Bugs Let Remote Authenticated Users Bypass Access Controls and Obtain Potentially Sensitive Information and Let Local Users Modify Files on the Target System - SecurityTrackerThird Party Advisory;VDB Entry
-
https://access.redhat.com/errata/RHSA-2017:3402
RHSA-2017:3402 - Security Advisory - Red Hat Customer PortalIssue Tracking;Third Party Advisory
-
https://www.postgresql.org/about/news/1801/
PostgreSQL: PostgreSQL 10.1, 9.6.6, 9.5.10, 9.4.15, 9.3.20, and 9.2.24 released!Issue Tracking;Vendor Advisory
-
https://access.redhat.com/errata/RHSA-2017:3405
RHSA-2017:3405 - Security Advisory - Red Hat Customer PortalIssue Tracking;Third Party Advisory
-
http://www.securityfocus.com/bid/101949
PostgreSQL CVE-2017-12172 Remote Privilege Escalation VulnerabilitiesThird Party Advisory;VDB Entry
-
https://www.postgresql.org/support/security/
PostgreSQL: Security InformationIssue Tracking;Vendor Advisory
Jump to