The EnterpriseDB Windows installer writes a password to a temporary file in its installation directory, creates initial databases, and deletes the file. During those seconds while the file exists, a local attacker can read the PostgreSQL superuser password from the file.
The PostgreSQL project thanks Noah Misch for reporting this problem.
Affected Version | Fixed In | Fix Published |
---|---|---|
11 | 11.5 | Aug. 8, 2019 |
10 | 10.10 | Aug. 8, 2019 |
9.6 | 9.6.15 | Aug. 8, 2019 |
9.5 | 9.5.19 | Aug. 8, 2019 |
9.4 | 9.4.24 | Aug. 8, 2019 |
For more information about PostgreSQL versioning, please visit the versioning page.
Overall Score | 6.7 |
---|---|
Component | packaging |
Vector | AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H |
If you wish to report a new security vulnerability in PostgreSQL, please send an email to security@postgresql.org.
For reporting non-security bugs, please see the Report a Bug page.