First published: Wed Jan 08 2003(Updated: )
Buffer overflows in (1) circle_poly, (2) path_encode and (3) path_add (also incorrectly identified as path_addr) for PostgreSQL 7.2.3 and earlier allow attackers to cause a denial of service and possibly execute arbitrary code, possibly as a result of an integer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PostgreSQL Common | =7.2 | |
PostgreSQL Common | =6.3.2 | |
PostgreSQL Common | =7.2.3 | |
PostgreSQL Common | =7.1.1 | |
PostgreSQL Common | =7.1.3 | |
PostgreSQL Common | =7.0.3 | |
PostgreSQL Common | =7.1 | |
PostgreSQL Common | =7.2.2 | |
PostgreSQL Common | =6.5.3 | |
PostgreSQL Common | =7.2.1 | |
PostgreSQL Common | =7.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1401 has a high severity due to its potential to cause denial of service and possibly execute arbitrary code.
To fix CVE-2002-1401, upgrade PostgreSQL to version 7.3 or later, where this vulnerability is addressed.
CVE-2002-1401 affects PostgreSQL versions 7.2.3 and earlier, including 7.2.2 and 7.1.x versions.
CVE-2002-1401 is a buffer overflow vulnerability that can lead to denial of service and may allow for arbitrary code execution.
Yes, CVE-2002-1401 is considered critical due to its severe impact on system stability and security.