First published: Wed Nov 20 2019(Updated: )
The snprintf implementation in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 does not properly handle system-call errors, which allows attackers to obtain sensitive information or have other unspecified impact via unknown vectors, as demonstrated by an out-of-memory error.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PostgreSQL | <9.0.20 | |
PostgreSQL | >=9.1<9.1.16 | |
PostgreSQL | >=9.2<9.2.11 | |
PostgreSQL | >=9.3<9.3.7 | |
PostgreSQL | >=9.4<9.4.2 | |
Debian Linux | =7.0 | |
Debian Linux | =8.0 | |
Debian Linux | =9.0 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =14.10 | |
Ubuntu | =15.04 | |
=17.1.0 | 17.1.1 | |
>=16.1.0<=16.1.5 | ||
>=15.1.0<=15.1.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3166 is a vulnerability in PostgreSQL that allows attackers to obtain sensitive information or have other unspecified impact.
PostgreSQL versions before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 are affected by CVE-2015-3166.
CVE-2015-3166 has a severity rating of 9.8 (critical).
To fix CVE-2015-3166, it is recommended to upgrade to PostgreSQL versions 9.0.20, 9.1.16, 9.2.11, 9.3.7, or 9.4.2.
More information about CVE-2015-3166 can be found at the following references: [1] [2] [3].