First published: Wed Jun 12 2019(Updated: )
Any authenticated user can overflow a stack-based buffer by changing the user's own password to a purpose-crafted value. This often suffices to execute arbitrary code as the PostgreSQL operating system account.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libpq | <0:12.1-3.el8 | 0:12.1-3.el8 |
redhat/rh-postgresql10-postgresql | <0:10.12-2.el7 | 0:10.12-2.el7 |
redhat/PostgreSQL | <10.9 | 10.9 |
redhat/PostgreSQL | <11.4 | 11.4 |
PostgreSQL PostgreSQL | >=10.0<10.9 | |
PostgreSQL PostgreSQL | >=11.0<11.4 | |
Redhat Enterprise Linux | =8.0 | |
Fedoraproject Fedora | =29 | |
Fedoraproject Fedora | =30 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID of this PostgreSQL vulnerability is CVE-2019-10164.
PostgreSQL versions 10.x before 10.9 and versions 11.x before 11.4 are affected by this vulnerability.
This vulnerability occurs due to a stack-based buffer overflow.
An authenticated user can overflow a stack-based buffer by changing their own password to a purpose-crafted value, which can often suffice to execute arbitrary code as the PostgreSQL process.
The severity of this vulnerability is critical with a CVSS score of 8.8.