CVE-2019-10128
19.03.2021, 20:15
A vulnerability was found in postgresql versions 11.x prior to 11.3. The Windows installer for EnterpriseDB-supplied PostgreSQL does not lock down the ACL of the binary installation directory or the ACL of the data directory; it keeps the inherited ACL. In the default configuration, this allows a local attacker to read arbitrary data directory files, essentially bypassing database-imposed read access limitations. In plausible non-default configurations, an attacker having both an unprivileged Windows account and an unprivileged PostgreSQL account can cause the PostgreSQL service account to execute arbitrary code.Enginsight
Vendor | Product | Version |
---|---|---|
postgresql | postgresql | 𝑥 < 9.4.22 |
postgresql | postgresql | 9.5.0 ≤ 𝑥 < 9.5.17 |
postgresql | postgresql | 9.6.0 ≤ 𝑥 < 9.6.13 |
postgresql | postgresql | 10.0 ≤ 𝑥 < 10.8 |
postgresql | postgresql | 11.0 ≤ 𝑥 < 11.3 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Ubuntu Product | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
postgresql-10 |
| ||||||||||
postgresql-11 |
| ||||||||||
postgresql-9.1 |
| ||||||||||
postgresql-9.3 |
| ||||||||||
postgresql-9.5 |
|
Common Weakness Enumeration
References