Re: FW: iDefense Q2 2006 Vulnerability Challenge

From: Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us>
To: "Magnus Hagander" <mha(at)sollentuna(dot)net>
Cc: pgsql-hackers(at)postgresql(dot)org
Subject: Re: FW: iDefense Q2 2006 Vulnerability Challenge
Date: 2006-05-21 22:43:40
Message-ID: 17179.1148251420@sss.pgh.pa.us
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-hackers

"Magnus Hagander" <mha(at)sollentuna(dot)net> writes:
> For those that haven't already seen it, this might give some extra
> exposure to PostgreSQL wrt vulnerability research. Though I think nobody
> will have a chance to find one (I just don't see how you could possibly
> get root through postgresql, since we refuse to run as root), other
> things might be exposed by someone who's poking around.

Yeah, I think they've really done the database community a disservice by
defining interesting exploits as being only those resulting in root.
An exploit that lets you get database superuser privs would be the
appropriate criterion here, IMHO.

regards, tom lane

In response to

Responses

Browse pgsql-hackers by date

  From Date Subject
Next Message Christopher Kings-Lynne 2006-05-22 03:15:42 Re: String Similarity
Previous Message Tom Lane 2006-05-21 22:15:36 Re: problem with PQsendQuery/PQgetResult and COPY FROM statement