CVE-2015-0241

HIGH

Postgresql < 9.0.19 - Buffer Overflow

Title source: rule
STIX 2.1

Description

The to_char function in PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a (1) large number of digits when processing a numeric formatting template, which triggers a buffer over-read, or (2) crafted timestamp formatting template, which triggers a buffer overflow.

References (7)

Core 7
Core References
Release Notes, Vendor Advisory x_refsource_confirm
http://www.postgresql.org/docs/9.4/static/release-9-4-1.html
Release Notes, Vendor Advisory x_refsource_confirm
http://www.postgresql.org/docs/current/static/release-9-0-19.html
Release Notes, Vendor Advisory x_refsource_confirm
http://www.postgresql.org/docs/current/static/release-9-1-15.html
Release Notes, Vendor Advisory x_refsource_confirm
http://www.postgresql.org/docs/current/static/release-9-2-10.html
Release Notes, Vendor Advisory x_refsource_confirm
http://www.postgresql.org/docs/current/static/release-9-3-6.html
Vendor Advisory x_refsource_confirm
http://www.postgresql.org/about/news/1569/
Third Party Advisory x_refsource_confirm
http://www.debian.org/security/2015/dsa-3155

Scores

CVSS v3 8.8
EPSS 0.0600
EPSS Percentile 90.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-120
Status published
Products (3)
debian/debian_linux 7.0
debian/debian_linux 8.0
postgresql/postgresql < 9.0.19
Published Jan 27, 2020
Tracked Since Feb 18, 2026