Re: [HACKERS] MySQL vulnerability

Поиск
Список
Период
Сортировка
От Tom Lane
Тема Re: [HACKERS] MySQL vulnerability
Дата
Msg-id 14095.917114480@sss.pgh.pa.us
обсуждение исходный текст
Ответ на MySQL vulnerability  ("Thomas G. Lockhart" <lockhart@alumni.caltech.edu>)
Список pgsql-hackers
"Thomas G. Lockhart" <lockhart@alumni.caltech.edu> writes:
> I found this item on a list of security vulnerabilities:
> mysql(1114) Remote stack overflow, create world-writable root-owned
> files
> (Port 1114 is mysql's listening port). I guess Postgres doesn't have a
> vulnerability for root ownership since nothing we do is run under the
> root account, right?

Not unless someone ignores the instructions and installs it to run as
root :-(

> Are we vulnerable to stack or buffer overflows with our on the wire
> protocol?

The postmaster seems to be secure against that --- pqpacket.c will
reject oversize packets out of hand.  The backend used to have an
off-by-one bug in pq_getstr, such that an overlength query would write
one byte past the end of the query buffer, but that's been fixed (it'd
be hard to exploit anyway).  libpq is careful about this sort of
thing also, although I suspect you could force a client application
crash by sending a query response large enough to exhaust memory :-(

Of course, a bad guy who's able to get past the postmaster's
authorization checks can do you far more damage by messing up your
database than by just crashing a particular backend or client...
        regards, tom lane


В списке pgsql-hackers по дате отправления:

Предыдущее
От: "D'Arcy" "J.M." Cain
Дата:
Сообщение: Primary key update not working
Следующее
От: Tom Lane
Дата:
Сообщение: Re: [HACKERS] Adding some const keywords to external interfaces