First published: Fri Feb 14 2014(Updated: )
It was found that the buffers used to hold datetime output were too small. Long output could lead to a stack-based buffer overflow, possibly allowing an authenticated database user to crash the PostgreSQL server or execute arbitrary code. Acknowledgements: Red Hat would like to thank the PostgreSQL project for reporting this issue. Upstream acknowledges Noah Misch as the original reporter.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PostgreSQL Common | <=8.4.19 | |
PostgreSQL Common | =8.4.1 | |
PostgreSQL Common | =8.4.2 | |
PostgreSQL Common | =8.4.3 | |
PostgreSQL Common | =8.4.4 | |
PostgreSQL Common | =8.4.5 | |
PostgreSQL Common | =8.4.6 | |
PostgreSQL Common | =8.4.7 | |
PostgreSQL Common | =8.4.8 | |
PostgreSQL Common | =8.4.9 | |
PostgreSQL Common | =8.4.10 | |
PostgreSQL Common | =8.4.11 | |
PostgreSQL Common | =8.4.12 | |
PostgreSQL Common | =8.4.13 | |
PostgreSQL Common | =8.4.14 | |
PostgreSQL Common | =8.4.15 | |
PostgreSQL Common | =8.4.16 | |
PostgreSQL Common | =8.4.17 | |
PostgreSQL Common | =8.4.18 | |
PostgreSQL Common | =9.0 | |
PostgreSQL Common | =9.0.1 | |
PostgreSQL Common | =9.0.2 | |
PostgreSQL Common | =9.0.3 | |
PostgreSQL Common | =9.0.4 | |
PostgreSQL Common | =9.0.5 | |
PostgreSQL Common | =9.0.6 | |
PostgreSQL Common | =9.0.7 | |
PostgreSQL Common | =9.0.8 | |
PostgreSQL Common | =9.0.9 | |
PostgreSQL Common | =9.0.10 | |
PostgreSQL Common | =9.0.11 | |
PostgreSQL Common | =9.0.12 | |
PostgreSQL Common | =9.0.13 | |
PostgreSQL Common | =9.0.14 | |
PostgreSQL Common | =9.0.15 | |
PostgreSQL Common | =9.1 | |
PostgreSQL Common | =9.1.1 | |
PostgreSQL Common | =9.1.2 | |
PostgreSQL Common | =9.1.3 | |
PostgreSQL Common | =9.1.4 | |
PostgreSQL Common | =9.1.5 | |
PostgreSQL Common | =9.1.6 | |
PostgreSQL Common | =9.1.7 | |
PostgreSQL Common | =9.1.8 | |
PostgreSQL Common | =9.1.9 | |
PostgreSQL Common | =9.1.10 | |
PostgreSQL Common | =9.1.11 | |
PostgreSQL Common | =9.2 | |
PostgreSQL Common | =9.2.1 | |
PostgreSQL Common | =9.2.2 | |
PostgreSQL Common | =9.2.3 | |
PostgreSQL Common | =9.2.4 | |
PostgreSQL Common | =9.2.5 | |
PostgreSQL Common | =9.2.6 | |
PostgreSQL Common | =9.3 | |
PostgreSQL Common | =9.3.1 | |
PostgreSQL Common | =9.3.2 | |
PostgreSQL | <=8.4.19 | |
PostgreSQL | =8.4.1 | |
PostgreSQL | =8.4.2 | |
PostgreSQL | =8.4.3 | |
PostgreSQL | =8.4.4 | |
PostgreSQL | =8.4.5 | |
PostgreSQL | =8.4.6 | |
PostgreSQL | =8.4.7 | |
PostgreSQL | =8.4.8 | |
PostgreSQL | =8.4.9 | |
PostgreSQL | =8.4.10 | |
PostgreSQL | =8.4.11 | |
PostgreSQL | =8.4.12 | |
PostgreSQL | =8.4.13 | |
PostgreSQL | =8.4.14 | |
PostgreSQL | =8.4.15 | |
PostgreSQL | =8.4.16 | |
PostgreSQL | =8.4.17 | |
PostgreSQL | =8.4.18 | |
PostgreSQL | =9.0 | |
PostgreSQL | =9.0.1 | |
PostgreSQL | =9.0.2 | |
PostgreSQL | =9.0.3 | |
PostgreSQL | =9.0.4 | |
PostgreSQL | =9.0.5 | |
PostgreSQL | =9.0.6 | |
PostgreSQL | =9.0.7 | |
PostgreSQL | =9.0.8 | |
PostgreSQL | =9.0.9 | |
PostgreSQL | =9.0.10 | |
PostgreSQL | =9.0.11 | |
PostgreSQL | =9.0.12 | |
PostgreSQL | =9.0.13 | |
PostgreSQL | =9.0.14 | |
PostgreSQL | =9.0.15 | |
PostgreSQL | =9.1 | |
PostgreSQL | =9.1.1 | |
PostgreSQL | =9.1.2 | |
PostgreSQL | =9.1.3 | |
PostgreSQL | =9.1.4 | |
PostgreSQL | =9.1.5 | |
PostgreSQL | =9.1.6 | |
PostgreSQL | =9.1.7 | |
PostgreSQL | =9.1.8 | |
PostgreSQL | =9.1.9 | |
PostgreSQL | =9.1.10 | |
PostgreSQL | =9.1.11 | |
PostgreSQL | =9.2 | |
PostgreSQL | =9.2.1 | |
PostgreSQL | =9.2.2 | |
PostgreSQL | =9.2.3 | |
PostgreSQL | =9.2.4 | |
PostgreSQL | =9.2.5 | |
PostgreSQL | =9.2.6 | |
PostgreSQL | =9.3 | |
PostgreSQL | =9.3.1 | |
PostgreSQL | =9.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0063 has a severity rating that may allow an authenticated database user to execute arbitrary code or crash the PostgreSQL server.
To fix CVE-2014-0063, you should upgrade PostgreSQL to a version that is not vulnerable, such as any version beyond 8.4.19.
CVE-2014-0063 affects PostgreSQL versions up to 8.4.19 and certain 9.x versions.
CVE-2014-0063 is a stack-based buffer overflow vulnerability related to datetime output.
CVE-2014-0063 requires an authenticated user to exploit the vulnerability, making it less likely for remote exploitation.