Vulnerability Description
The pg_ctlcluster script in postgresql-common in versions prior to 210 didn't drop privileges when creating socket/statistics temporary directories, which could result in local privilege escalation.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Postgresql | Postgresql-Common | < 210 |
| Canonical | Ubuntu Linux | 16.04 |
| Debian | Debian Linux | 9.0 |
Related Weaknesses (CWE)
References
- https://blog.mirch.io/2019/11/15/cve-2019-3466-debian-ubuntu-pg_ctlcluster-priviExploitPatchThird Party Advisory
- https://usn.ubuntu.com/4194-2/
- https://blog.mirch.io/2019/11/15/cve-2019-3466-debian-ubuntu-pg_ctlcluster-priviExploitPatchThird Party Advisory
- https://usn.ubuntu.com/4194-2/
FAQ
What is CVE-2019-3466?
CVE-2019-3466 is a vulnerability with a CVSS score of 7.8 (HIGH). The pg_ctlcluster script in postgresql-common in versions prior to 210 didn't drop privileges when creating socket/statistics temporary directories, which could result in local privilege escalation.
How severe is CVE-2019-3466?
CVE-2019-3466 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-3466?
Check the references section above for vendor advisories and patch information. Affected products include: Postgresql Postgresql-Common, Canonical Ubuntu Linux, Debian Debian Linux.