First published: Tue Feb 06 2007(Updated: )
PostgreSQL 7.3 before 7.3.13, 7.4 before 7.4.16, 8.0 before 8.0.11, 8.1 before 8.1.7, and 8.2 before 8.2.2 allows attackers to disable certain checks for the data types of SQL function arguments, which allows remote authenticated users to cause a denial of service (server crash) and possibly access database content.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PostgreSQL Common | >=7.3<7.3.18 | |
PostgreSQL Common | >=7.4<7.4.16 | |
PostgreSQL Common | >=8.0<8.0.11 | |
PostgreSQL Common | >=8.1<8.1.7 | |
PostgreSQL Common | >=8.2<8.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-0555 has been identified as a moderate severity vulnerability due to its potential to cause a denial of service and possibly unauthorized access.
To fix CVE-2007-0555, upgrade your PostgreSQL installation to version 7.3.13, 7.4.16, 8.0.11, 8.1.7, or 8.2.2 or later.
CVE-2007-0555 affects PostgreSQL versions prior to 7.3.13, 7.4.16, 8.0.11, 8.1.7, and 8.2.2.
Yes, CVE-2007-0555 can potentially allow remote authenticated users to gain unauthorized access under certain conditions.
Exploiting CVE-2007-0555 may lead to a denial of service, resulting in a server crash.