First published: Mon Jan 27 2020(Updated: )
Stack-based buffer overflow in the *printf function implementations in PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1, when running on a Windows system, allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a floating point number with a large precision, as demonstrated by using the to_char function.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PostgreSQL PostgreSQL | <9.0.19 | |
PostgreSQL PostgreSQL | >=9.1.0<9.1.15 | |
PostgreSQL PostgreSQL | >=9.2.0<9.2.10 | |
PostgreSQL PostgreSQL | >=9.3.0<9.3.6 | |
PostgreSQL PostgreSQL | >=9.4.0<9.4.1 | |
Microsoft Windows | ||
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0242 refers to a stack-based buffer overflow vulnerability in the *printf function implementations in PostgreSQL before version 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 when running on a Windows system.
CVE-2015-0242 allows remote authenticated users to cause a denial of service (crash) and potentially execute arbitrary code by exploiting the vulnerability in the *printf function implementations.
CVE-2015-0242 has a severity rating of 8.8 (high).
To fix CVE-2015-0242 in PostgreSQL, it is recommended to upgrade to version 9.0.19, 9.1.15, 9.2.10, 9.3.6, or 9.4.1, depending on the version you are currently using.
You can find more information about CVE-2015-0242 in the following references: [1] http://www.debian.org/security/2015/dsa-3155 [2] http://www.postgresql.org/about/news/1569/ [3] http://www.postgresql.org/docs/9.4/static/release-9-4-1.html