Buffer Overflow Vulnerability in PostgreSQL Affects Multiple Versions
CVE-2015-0241
8.8HIGH
Key Information:
- Vendor
- Postgresql Global Development Group
- Status
- Postgresql
- Vendor
- CVE Published:
- 27 January 2020
Summary
The to_char function in PostgreSQL prior to version 9.0.19 and various other versions allows remote authenticated users to exploit improperly handled input. This can result in a denial of service condition due to crashes triggered by excessively large numeric formatting inputs or specially crafted timestamp templates, potentially leading to remote code execution through buffer overflow vulnerabilities.
Affected Version(s)
PostgreSQL before 9.0.19
PostgreSQL 9.1.x before 9.1.15
PostgreSQL 9.2.x before 9.2.10
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved