Buffer Overflow Vulnerability in PostgreSQL Affects Multiple Versions
CVE-2015-0241

8.8HIGH

Key Information:

Vendor
Postgresql Global Development Group
Status
Postgresql
Vendor
CVE Published:
27 January 2020

Summary

The to_char function in PostgreSQL prior to version 9.0.19 and various other versions allows remote authenticated users to exploit improperly handled input. This can result in a denial of service condition due to crashes triggered by excessively large numeric formatting inputs or specially crafted timestamp templates, potentially leading to remote code execution through buffer overflow vulnerabilities.

Affected Version(s)

PostgreSQL before 9.0.19

PostgreSQL 9.1.x before 9.1.15

PostgreSQL 9.2.x before 9.2.10

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.