First published: Wed Jan 08 2003(Updated: )
Vulnerability in the cash_words() function for PostgreSQL 7.2 and earlier allows local users to cause a denial of service and possibly execute arbitrary code via a large negative argument, possibly triggering an integer signedness error or buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PostgreSQL Common | =7.2 | |
PostgreSQL Common | =6.3.2 | |
PostgreSQL Common | =7.1.1 | |
PostgreSQL Common | =7.1.3 | |
PostgreSQL Common | =7.0.3 | |
PostgreSQL Common | =7.1 | |
PostgreSQL Common | =6.5.3 | |
PostgreSQL Common | =7.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1397 has a high severity level due to its potential to cause a denial of service and execute arbitrary code.
To mitigate CVE-2002-1397, upgrade PostgreSQL to version 7.3 or later, where the vulnerability has been addressed.
CVE-2002-1397 affects local users of PostgreSQL version 7.2 and earlier.
The impact of CVE-2002-1397 includes potential denial of service and arbitrary code execution risks.
Vulnerable versions to CVE-2002-1397 include PostgreSQL 7.2, 7.1.x, and 6.5.3 and earlier.