When batch jobs are executed by pgAgent, a script is created in a temporary directory and then executed. In versions of pgAgent prior to 4.2.3, an insufficiently seeded random number generator is used when generating the directory name, leading to the possibility for a local attacker to pre-create the directory and thus prevent pgAgent from executing jobs, disrupting scheduled tasks.
Metrics
Affected Vendors & Products
References
History
Tue, 07 Jan 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 07 Jan 2025 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | When batch jobs are executed by pgAgent, a script is created in a temporary directory and then executed. In versions of pgAgent prior to 4.2.3, an insufficiently seeded random number generator is used when generating the directory name, leading to the possibility for a local attacker to pre-create the directory and thus prevent pgAgent from executing jobs, disrupting scheduled tasks. | |
Title | pgAgent scheduled batch job scripts are created in a predictable temporary directory potentially allowing a denial of service | |
Weaknesses | CWE-340 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: PostgreSQL
Published: 2025-01-07T19:18:02.865Z
Updated: 2025-01-08T17:56:00.784Z
Reserved: 2025-01-04T02:53:10.494Z
Link: CVE-2025-0218
Vulnrichment
Updated: 2025-01-07T20:58:44.409Z
NVD
Status : Received
Published: 2025-01-07T20:15:30.710
Modified: 2025-01-07T20:15:30.710
Link: CVE-2025-0218
Redhat
No data.