Vulnerability Note VU#567452

PostgreSQL database privilege escalation vulnerability

Original Release date: 27 Feb 2006 | Last revised: 17 May 2006


PostgreSQL fails to properly recover from errors. This may allow an authenticated attacker to gain elevated privileges on a PostgreSQL database.


PostgreSQL Database

PostgreSQL is an open source database management system.

The Problem

There is a vulnerability in the way that PostgreSQL recovers from errors. According to the release notes for PostgreSQL 8.1.3:

    Due to inadequate validity checking, a user could exploit the special case that SET ROLE normally uses to restore the previous role setting after an error. This allowed ordinary users to acquire superuser status, for example.

This issue only exists in PostgreSQL versions 8.1.0 to 8.1.2. An attacker must have valid credentials to exploit this vulnerability.


An authenticated attacker may be able to gain elevated privileges on a PostgreSQL database.



This issue has been corrected in PostgreSQL version 8.1.3.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
PostgreSQLAffected-27 Feb 2006
Red Hat, Inc.Unknown-17 May 2006
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



This issue was reported in the release notes for PostgreSQL 8.1.3. PostgreSQL credits Akio Ishida with providing information regarding this issue.

This document was written by Jeff Gennari.

Other Information

  • CVE IDs: CVE-2006-0553
  • Date Public: 14 Feb 2006
  • Date First Published: 27 Feb 2006
  • Date Last Updated: 17 May 2006
  • Severity Metric: 2.55
  • Document Revision: 17


If you have feedback, comments, or additional information about this vulnerability, please send us email.