CVE-2020-25694

CVE Details

Release Date:2020-11-16
Impact:None What is this?

Description


A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. If a client application that creates additional database connections only reuses the basic connection parameters while dropping security-relevant parameters, an opportunity for a man-in-the-middle attack, or the ability to observe clear-text transmissions, could exist. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

See more information about CVE-2020-25694 from MITRE CVE dictionary and NIST NVD


NOTE: The following CVSS metrics and score provided are preliminary and subject to review.


CVSS v3 metrics

Base Score: 8.1
Vector String: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Version: 3.0
Attack Vector: Network
Attack Complexity: High
Privileges Required: None
User Interaction: None
Scope: Unchanged
Confidentiality Impact: High
Integrity Impact: High
Availability Impact: High

Errata information


PlatformErrataRelease Date
Oracle Linux version 7 (postgresql)ELSA-2021-15122021-05-06
Oracle Linux version 7 (rh-postgresql10-postgresql)ELSA-2021-92902021-06-11
Oracle Linux version 8 (libpq)ELSA-2020-54012020-12-15
Oracle Linux version 8 (pgaudit)ELSA-2020-5620-12020-12-23
Oracle Linux version 8 (postgres-decoderbufs)ELSA-2020-5620-12020-12-23
Oracle Linux version 8 (postgresql)ELSA-2020-5567-12020-12-22
Oracle Linux version 8 (postgresql)ELSA-2020-5619-12020-12-23
Oracle Linux version 8 (postgresql)ELSA-2020-5620-12020-12-23


This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections:

software.hardware.complete