First published: Thu Oct 22 2009(Updated: )
The postgresql-ocaml bindings 1.5.4, 1.7.0, and 1.12.1 for PostgreSQL libpq do not properly support the PQescapeStringConn function, which might allow remote attackers to leverage escaping issues involving multibyte character encodings.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Postgresql-ocaml | =1.5.4 | |
Postgresql-ocaml | =1.7.0 | |
Postgresql-ocaml | =1.12.1 | |
PostgreSQL JDBC Driver |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-2943 has a moderate severity level due to potential remote code execution risks associated with improper multibyte character encoding handling.
To fix CVE-2009-2943, upgrade to a version of postgresql-ocaml that is not affected, specifically versions above 1.12.1.
CVE-2009-2943 affects postgresql-ocaml bindings versions 1.5.4, 1.7.0, and 1.12.1.
Yes, CVE-2009-2943 can potentially be exploited remotely through the PQescapeStringConn function.
The potential risk of CVE-2009-2943 involves attackers being able to execute arbitrary code or alter database content through improper escaping of multibyte characters.