PostgreSQL 8.4.x before 8.4.11, 9.0.x before 9.0.7, and 9.1.x before 9.1.3 truncates the common name to only 32 characters when verifying SSL certificates, which allows remote attackers to spoof connections when the host name is exactly 32 characters.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.postgresql.org/about/news/1377/ | vendor advisory |
http://secunia.com/advisories/49273 | third party advisory |
http://rhn.redhat.com/errata/RHSA-2012-0678.html | third party advisory vendor advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2012:026 | vendor advisory broken link |
http://www.postgresql.org/docs/9.0/static/release-9-0-7.html | release notes vendor advisory |
http://www.postgresql.org/docs/8.4/static/release-8-4-11.html | release notes vendor advisory |
http://www.debian.org/security/2012/dsa-2418 | third party advisory vendor advisory |
http://www.postgresql.org/docs/9.1/static/release-9-1-3.html | release notes vendor advisory |
http://lists.opensuse.org/opensuse-updates/2012-09/msg00060.html | third party advisory vendor advisory |