First published: Mon Jan 27 2020(Updated: )
The to_char function in PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a (1) large number of digits when processing a numeric formatting template, which triggers a buffer over-read, or (2) crafted timestamp formatting template, which triggers a buffer overflow.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PostgreSQL PostgreSQL | <9.0.19 | |
PostgreSQL PostgreSQL | >=9.1.0<9.1.15 | |
PostgreSQL PostgreSQL | >=9.2.0<9.2.10 | |
PostgreSQL PostgreSQL | >=9.3.0<9.3.6 | |
PostgreSQL PostgreSQL | >=9.4.0<9.4.1 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0241 is a vulnerability in PostgreSQL that allows remote authenticated users to cause a denial of service or possibly execute arbitrary code.
CVE-2015-0241 affects PostgreSQL versions before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1.
CVE-2015-0241 has a severity rating of 8.8 (high).
CVE-2015-0241 can be exploited by sending a large number of digits when processing a numeric value using the to_char function in PostgreSQL.
Yes, you can find references for CVE-2015-0241 at the following links: [1] [2] [3].