First published: Fri Feb 14 2014(Updated: )
It was found that the buffers used to hold datetime output were too small. Long output could lead to a stack-based buffer overflow, possibly allowing an authenticated database user to crash the PostgreSQL server or execute arbitrary code. Acknowledgements: Red Hat would like to thank the PostgreSQL project for reporting this issue. Upstream acknowledges Noah Misch as the original reporter.
Affected Software | Affected Version | How to fix |
---|---|---|
PostgreSQL Common |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1065226 is critical due to the potential for stack-based buffer overflow.
To fix REDHAT-BUG-1065226, update PostgreSQL to the latest patched version that addresses the buffer overflow issue.
Authenticated database users of PostgreSQL may be affected by REDHAT-BUG-1065226.
REDHAT-BUG-1065226 is a stack-based buffer overflow vulnerability.
Yes, REDHAT-BUG-1065226 could potentially enable an authenticated user to execute arbitrary code on the server.