CVE-2018-10936

Source
https://nvd.nist.gov/vuln/detail/CVE-2018-10936
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-10936.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2018-10936
Aliases
Related
Published
2018-08-30T13:29:00Z
Modified
2024-09-18T02:54:47.678040Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A weakness was found in postgresql-jdbc before version 42.2.5. It was possible to provide an SSL Factory and not check the host name if a host name verifier was not provided to the driver. This could lead to a condition where a man-in-the-middle attacker could masquerade as a trusted server by providing a certificate for the wrong host, as long as it was signed by a trusted CA.

References

Affected packages

Debian:11 / libpgjava

Package

Name
libpgjava
Purl
pkg:deb/debian/libpgjava?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
42.2.5-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / libpgjava

Package

Name
libpgjava
Purl
pkg:deb/debian/libpgjava?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
42.2.5-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / libpgjava

Package

Name
libpgjava
Purl
pkg:deb/debian/libpgjava?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
42.2.5-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/pgjdbc/pgjdbc

Affected ranges

Type
GIT
Repo
https://github.com/pgjdbc/pgjdbc
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

REL42.*

REL42.0.0
REL42.1.0
REL42.1.1
REL42.1.2
REL42.1.3
REL42.1.4
REL42.2.0
REL42.2.1
REL42.2.2
REL42.2.3
REL42.2.4

Other

REL6_5
REL7_0
REL7_1
REL7_1_BETA
REL7_1_BETA2
REL7_1_BETA3
REL7_2
REL7_2_3
REL7_2_4
REL7_2_BETA1
REL7_2_BETA2
REL7_2_BETA3
REL7_2_BETA4
REL7_2_BETA5
REL7_2_RC1
REL7_2_RC2
REL7_4_BETA1
REL7_4_BETA2
REL7_4_BETA3
REL7_4_BETA4
REL7_4_BETA5
REL7_4_RC1
REL7_4_RC2
REL8_0_309
REL8_1_404
REL8_2_504
REL8_3_603
REL8_4_701
REL9_0_801
REL9_3_1100
REL9_4_1201
REL9_4_1202
REL9_4_1203
REL9_4_1204
REL9_4_1205
REL9_4_1206
release-6-3

REL9.*

REL9.4.1207
REL9.4.1208
REL9.4.1209
REL9.4.1210
REL9.4.1211
REL9.4.1212