When batch jobs are executed by pgAgent, a script is created in a temporary directory and then executed. In versions of pgAgent prior to 4.2.3, an insufficiently seeded random number generator is used when generating the directory name, leading to the possibility for a local attacker to pre-create the directory and thus prevent pgAgent from executing jobs, disrupting scheduled tasks.
Metrics
Affected Vendors & Products
References
History
Tue, 11 Feb 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pgadmin
Pgadmin pgagent |
|
| Weaknesses | CWE-330 | |
| CPEs | cpe:2.3:a:pgadmin:pgagent:*:*:*:*:*:postgresql:*:* | |
| Vendors & Products |
Pgadmin
Pgadmin pgagent |
Tue, 07 Jan 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 07 Jan 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | When batch jobs are executed by pgAgent, a script is created in a temporary directory and then executed. In versions of pgAgent prior to 4.2.3, an insufficiently seeded random number generator is used when generating the directory name, leading to the possibility for a local attacker to pre-create the directory and thus prevent pgAgent from executing jobs, disrupting scheduled tasks. | |
| Title | pgAgent scheduled batch job scripts are created in a predictable temporary directory potentially allowing a denial of service | |
| Weaknesses | CWE-340 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: PostgreSQL
Published: 2025-01-07T19:18:02.865Z
Updated: 2025-01-08T17:56:00.784Z
Reserved: 2025-01-04T02:53:10.494Z
Link: CVE-2025-0218
Updated: 2025-01-07T20:58:44.409Z
Status : Analyzed
Published: 2025-01-07T20:15:30.710
Modified: 2025-02-11T21:11:36.480
Link: CVE-2025-0218
No data.