Stack-based buffer overflow in the *printf function implementations in PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1, when running on a Windows system, allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a floating point number with a large precision, as demonstrated by using the to_char function.
References
Link | Resource |
---|---|
http://www.postgresql.org/about/news/1569/ | Vendor Advisory |
http://www.debian.org/security/2015/dsa-3155 | Third Party Advisory |
http://www.postgresql.org/docs/9.4/static/release-9-4-1.html | Release Notes Vendor Advisory |
http://www.postgresql.org/docs/current/static/release-9-2-10.html | Release Notes Vendor Advisory |
http://www.postgresql.org/docs/current/static/release-9-0-19.html | Release Notes Vendor Advisory |
http://www.postgresql.org/docs/current/static/release-9-1-15.html | Release Notes Vendor Advisory |
http://www.postgresql.org/docs/current/static/release-9-3-6.html | Release Notes Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
|
Information
Published : 2020-01-27 08:15
Updated : 2020-01-31 12:30
NVD link : CVE-2015-0242
Mitre link : CVE-2015-0242
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
debian
- debian_linux
postgresql
- postgresql
microsoft
- windows