First published: Wed Jan 08 2003(Updated: )
Buffer overflows in (1) circle_poly, (2) path_encode and (3) path_add (also incorrectly identified as path_addr) for PostgreSQL 7.2.3 and earlier allow attackers to cause a denial of service and possibly execute arbitrary code, possibly as a result of an integer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PostgreSQL PostgreSQL | =6.3.2 | |
PostgreSQL PostgreSQL | =6.5.3 | |
PostgreSQL PostgreSQL | =7.0.3 | |
PostgreSQL PostgreSQL | =7.1 | |
PostgreSQL PostgreSQL | =7.1.1 | |
PostgreSQL PostgreSQL | =7.1.2 | |
PostgreSQL PostgreSQL | =7.1.3 | |
PostgreSQL PostgreSQL | =7.2 | |
PostgreSQL PostgreSQL | =7.2.1 | |
PostgreSQL PostgreSQL | =7.2.2 | |
PostgreSQL PostgreSQL | =7.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.