This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy
There is a privilege escalation vulnerability in the validator functions of the GaussDB. An attacker may log in to the system as a low-privilege user and execute the high-privilege functions. Then, the attacker may obtain the high-privilege of the GaussDB and crash the system. (Vulnerability ID: HWPSIRT-2017-05015)
This vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2014-0061.
There is a privilege escalation vulnerability in the GaussDB. An attacker may log in to the system as a low-privilege user. When the high-privilege user executes specific operation, the attacker could modify the high-privilege user's tables and crash the system. (Vulnerability ID: HWPSIRT-2017-05171)
This vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2014-0062.
Huawei has released software updates to fix these vulnerabilities. This advisory is available at the following link:
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170531-05-gaussdb-en
Product Name |
Affected Version |
Resolved Product and Version |
FusionSphere OpenStack |
V100R005C00SPC100 |
Upgrade to V100R005C10SPC700 |
HWPSIRT-2017-05015:
By exploiting this vulnerability, the attacker could obtain the high-privilege of the GaussDB and crash the system.
HWPSIRT-2017-05171:
By exploiting this vulnerability, the attacker could modify the tables and crash the GaussDB.
The vulnerability classification has been performed by using the CVSSv3 scoring system (http://www.first.org/cvss/specification-document).
HWPSIRT-2017-05015:
Base Score: 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)
Temporal Score: 5.9 (E:F/RL:O/RC:C)
HWPSIRT-2017-05171:
Base Score: 5.3 (AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N)
Temporal Score: 4.9 (E:F/RL:O/RC:C)
HWPSIRT-2017-05015:
This vulnerability can be exploited only when the following conditions are present:
An attacker should log in to the system as a low-privilege user.
Vulnerability details:
There is a privilege escalation vulnerability in the validator functions of the GaussDB. An attacker may log in to the system as a low-privilege user and execute the high-privilege functions. Then, the attacker may obtain the high-privilege of the GaussDB and crash the system.
HWPSIRT-2017-05171:
This vulnerability can be exploited only when the following conditions are present:
An attacker should log in to the system as a low-privilege user.
Vulnerability details:
There is a privilege escalation vulnerability in the GaussDB. An attacker may log in to the system as a low-privilege user. When the high-privilege user executes specific operation, the attacker could modify the high-privilege user's tables and crash the GaussDB.
Customers should contact Huawei TAC (Huawei Technical Assistance Center) to request the upgrades. For TAC contact information, please refer to Huawei worldwide website at http://www.huawei.com/en/psirt/report-vulnerabilities.
This vulnerability was discovered by Huawei internal tester.
2017-05-31 V1.0 INITIAL
None
Huawei adheres to protecting the ultimate interests of users with best efforts and the principle of responsible disclosure and deal with product security issues through our response mechanism.
To enjoy Huawei PSIRT services and obtain Huawei product vulnerability information, please visit http://www.huawei.com/en/psirt.
To report a security vulnerability in Huawei products and solutions, please send it to PSIRT@huawei.com. For details, please visit http://www.huawei.com/en/psirt/report-vulnerabilities.