When batch jobs are executed by pgAgent, a script is created in a temporary directory and then executed. In versions of pgAgent prior to 4.2.3, an insufficiently seeded random number generator is used when generating the directory name, leading to the possibility for a local attacker to pre-create the directory and thus prevent pgAgent from executing jobs, disrupting scheduled tasks.
History

Tue, 07 Jan 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Jan 2025 19:30:00 +0000

Type Values Removed Values Added
Description When batch jobs are executed by pgAgent, a script is created in a temporary directory and then executed. In versions of pgAgent prior to 4.2.3, an insufficiently seeded random number generator is used when generating the directory name, leading to the possibility for a local attacker to pre-create the directory and thus prevent pgAgent from executing jobs, disrupting scheduled tasks.
Title pgAgent scheduled batch job scripts are created in a predictable temporary directory potentially allowing a denial of service
Weaknesses CWE-340
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: PostgreSQL

Published: 2025-01-07T19:18:02.865Z

Updated: 2025-01-08T17:56:00.784Z

Reserved: 2025-01-04T02:53:10.494Z

Link: CVE-2025-0218

cve-icon Vulnrichment

Updated: 2025-01-07T20:58:44.409Z

cve-icon NVD

Status : Received

Published: 2025-01-07T20:15:30.710

Modified: 2025-01-07T20:15:30.710

Link: CVE-2025-0218

cve-icon Redhat

No data.