Rapid7 Vulnerability & Exploit Database

USN-1717-1: PostgreSQL vulnerability

Back to Search

USN-1717-1: PostgreSQL vulnerability

Severity
7
CVSS
(AV:N/AC:L/Au:S/C:N/I:N/A:C)
Published
02/12/2013
Created
07/25/2018
Added
05/06/2013
Modified
07/04/2017

Description

PostgreSQL 9.2.x before 9.2.3, 9.1.x before 9.1.8, 9.0.x before 9.0.12, 8.4.x before 8.4.16, and 8.3.x before 8.3.23 does not properly declare the enum_recv function in backend/utils/adt/enum.c, which causes it to be invoked with incorrect arguments and allows remote authenticated users to cause a denial of service (server crash) or read sensitive process memory via a crafted SQL command, which triggers an array index error and an out-of-bounds read.

Solution(s)

  • ubuntu-upgrade-postgresql-8-3
  • ubuntu-upgrade-postgresql-8-4
  • ubuntu-upgrade-postgresql-9-1

References

  • ubuntu-upgrade-postgresql-8-3
  • ubuntu-upgrade-postgresql-8-4
  • ubuntu-upgrade-postgresql-9-1

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;