First published: Fri Feb 27 2009(Updated: )
PostgreSQL before 8.3.7, 8.2.13, 8.1.17, 8.0.21, and 7.4.25 allows remote authenticated users to cause a denial of service (stack consumption and crash) by triggering a failure in the conversion of a localized error message to a client-specified encoding, as demonstrated using mismatched encoding conversion requests.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/postgresql | <0:7.4.26-1.el4_8.1 | 0:7.4.26-1.el4_8.1 |
redhat/postgresql | <0:8.1.18-2.el5_4.1 | 0:8.1.18-2.el5_4.1 |
PostgreSQL Common | =7.4.24 | |
PostgreSQL Common | =8.0.20 | |
PostgreSQL Common | =8.1.16 | |
PostgreSQL Common | =8.2.12 | |
PostgreSQL Common | =8.3.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0922 is classified as a denial of service vulnerability that can cause stack consumption and crash.
To mitigate CVE-2009-0922, upgrade PostgreSQL to versions 7.4.26, 8.1.18, 8.2.13, 8.3.7 or later.
Affected versions include PostgreSQL 7.4.25, 8.0.21, 8.1.17, 8.2.12, and 8.3.6 and earlier.
Yes, remote authenticated users can exploit CVE-2009-0922 to induce a DoS condition.
Users of affected PostgreSQL versions, particularly those allowing remote authenticated access, are impacted by CVE-2009-0922.