First published: Tue May 04 2021(Updated: )
PostgreSQL could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an integer overflow while modifying certain SQL array values. By sending a specially-crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/postgresql | <13.3 | 13.3 |
redhat/postgresql | <12.7 | 12.7 |
redhat/postgresql | <11.12 | 11.12 |
redhat/postgresql | <10.17 | 10.17 |
redhat/postgresql | <9.6.22 | 9.6.22 |
PostgreSQL PostgreSQL | >=9.6.0<9.6.22 | |
PostgreSQL PostgreSQL | >=10.0<10.17 | |
PostgreSQL PostgreSQL | >=11.0<11.12 | |
PostgreSQL PostgreSQL | >=12.0<12.7 | |
PostgreSQL PostgreSQL | >=13.0<13.3 | |
Redhat Jboss Enterprise Application Platform | =7.0.0 | |
Redhat Software Collections | ||
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
IBM DRM | <=2.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this flaw in PostgreSQL is CVE-2021-32027.
The severity level of CVE-2021-32027 is high, with a CVSS score of 8.8.
Versions before 13.3, 12.7, 11.12, 10.17, and 9.6.22 of PostgreSQL are affected by CVE-2021-32027.
An authenticated database user can exploit CVE-2021-32027 by modifying certain SQL array values to write arbitrary bytes to a wide area of server memory.
You can find more information about CVE-2021-32027 on the IBM X-Force Exchange website, the IBM Support page, and the Red Hat Bugzilla page.