CVE-2020-25694

CVE Details

Release Date:2020-11-16

Description


A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. If a client application that creates additional database connections only reuses the basic connection parameters while dropping security-relevant parameters, an opportunity for a man-in-the-middle attack, or the ability to observe clear-text transmissions, could exist. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

See more information about CVE-2020-25694 from MITRE CVE dictionary and NIST NVD


CVSS v3.0 metrics


NOTE: The following CVSS v3.0 metrics and score provided are preliminary and subject to review.

Base Score: 8.1 Base Metrics: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Access Vector: Network Attack Complexity: High
Privileges Required: None User Interaction: None
Scope: Unchanged Confidentiality Impact: High
Integrity Impact: High Availability Impact: High

Errata information


PlatformErrataRelease Date
Oracle Linux version 7 (postgresql)ELSA-2021-15122021-05-06
Oracle Linux version 7 (rh-postgresql10-postgresql)ELSA-2021-92902021-06-11
Oracle Linux version 8 (libpq)ELSA-2020-54012020-12-15
Oracle Linux version 8 (pgaudit)ELSA-2020-5620-12020-12-23
Oracle Linux version 8 (postgres-decoderbufs)ELSA-2020-5620-12020-12-23
Oracle Linux version 8 (postgresql)ELSA-2020-5567-12020-12-22
Oracle Linux version 8 (postgresql)ELSA-2020-5619-12020-12-23
Oracle Linux version 8 (postgresql)ELSA-2020-5620-12020-12-23



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete