Memory Exposure Vulnerability in PostgreSQL by PostgreSQL Global Development Group
CVE-2021-3677

6.5MEDIUM

Key Information:

Vendor
Postgresql
Vendor
CVE Published:
2 March 2022

Summary

A vulnerability in PostgreSQL allows authenticated users to execute specially crafted queries that can read arbitrary bytes from the server's memory. This flaw can be exploited without the need for additional privileges, making it a significant risk in default configurations. The severity of the attack can vary depending on the server settings, specifically if 'max_worker_processes' is set to 0, making some known exploit variants infeasible. However, there may exist undiscovered attack variants that are not limited by this server configuration. Database administrators should assess their systems to ensure they are protected against this memory exposure risk.

Affected Version(s)

postgresql Fixedin v13.4, v12.8, v11.13

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.