First published: Tue May 04 2021(Updated: )
PostgreSQL could allow a remote authenticated attacker to obtain sensitive information, caused by a memory disclosure vulnerability when using an INSERT … ON CONFLICT … DO UPDATE command on a purpose-crafted table. By creating prerequisite objects, an attacker could exploit this vulnerability to read arbitrary bytes of server memory.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/postgresql | <13.3 | 13.3 |
redhat/postgresql | <12.7 | 12.7 |
redhat/postgresql | <11.12 | 11.12 |
redhat/postgresql | <10.17 | 10.17 |
redhat/postgresql | <9.6.22 | 9.6.22 |
PostgreSQL PostgreSQL | >=9.6.0<9.6.22 | |
PostgreSQL PostgreSQL | >=10.0<10.17 | |
PostgreSQL PostgreSQL | >=11.0<11.12 | |
PostgreSQL PostgreSQL | >=12.0<12.7 | |
PostgreSQL PostgreSQL | >=13.0<13.3 | |
IBM DRM | <=2.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-32028 is a vulnerability in PostgreSQL that allows a remote authenticated attacker to obtain sensitive information.
The severity of CVE-2021-32028 is medium with a CVSS score of 6.5.
CVE-2021-32028 affects PostgreSQL versions 9.6.0 to 9.6.22, 10.0 to 10.17, 11.0 to 11.12, 12.0 to 12.7, and 13.0 to 13.3.
An attacker can exploit CVE-2021-32028 by using an INSERT ... ON CONFLICT ... DO UPDATE command on a purpose-crafted table to obtain sensitive information.
Yes, you can find more information about CVE-2021-32028 at the following references: [1] [2] [3]