First published: Thu Apr 30 2009(Updated: )
Heap-based buffer overflow in the DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module 1.49 for Perl might allow context-dependent attackers to execute arbitrary code via unspecified input to an application that uses the getline and pg_getline functions to read database rows.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Perl | ||
CMU DBD | =\-pg |
http://security.debian.org/pool/updates/main/libd/libdbd-pg-perl/libdbd-pg-perl_1.49-2+etch1.diff.gz
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0663 is considered a critical vulnerability due to the potential for arbitrary code execution.
To fix CVE-2009-0663, upgrade the DBD::Pg module to a version that is not affected by this vulnerability.
CVE-2009-0663 affects the DBD::Pg module version 1.49 for Perl.
Yes, CVE-2009-0663 can be exploited by context-dependent attackers through specific input.
The functions getline and pg_getline in the DBD::Pg module are related to CVE-2009-0663.