First published: Fri Dec 11 2009(Updated: )
An integer overflow flaw was found in the way postgresql used to calculate size for the hashtable for joined relations. An attacker could formulate a specially-crafted sql query, which once processed would lead to denial of service (postgresql daemon crash). Upstream bug report: -------------------- [1] <a href="http://archives.postgresql.org/pgsql-bugs/2009-10/msg00277.php">http://archives.postgresql.org/pgsql-bugs/2009-10/msg00277.php</a> References: ----------- [2] <a href="http://archives.postgresql.org/pgsql-bugs/2009-10/msg00287.php">http://archives.postgresql.org/pgsql-bugs/2009-10/msg00287.php</a> [3] <a href="http://archives.postgresql.org/pgsql-bugs/2009-10/msg00310.php">http://archives.postgresql.org/pgsql-bugs/2009-10/msg00310.php</a> [4] <a href="http://archives.postgresql.org/pgsql-bugs/2009-10/msg00289.php">http://archives.postgresql.org/pgsql-bugs/2009-10/msg00289.php</a> Upstream patch: --------------- git clone git://git.postgresql.org/git/postgresql.git cd postgresql && git show 64b057e6823655fb6c5d1f24a28f236b94dd6c54 Credit: ------- Bernt Marius Johnsen
Affected Software | Affected Version | How to fix |
---|---|---|
PostgreSQL JDBC Driver |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-546621 is classified as high due to the potential for denial of service.
To fix REDHAT-BUG-546621, apply the latest security patches for PostgreSQL that address this integer overflow vulnerability.
REDHAT-BUG-546621 affects multiple versions of PostgreSQL prior to the security fix.
The attack associated with REDHAT-BUG-546621 involves sending specially-crafted SQL queries that exploit the integer overflow flaw.
The impact of REDHAT-BUG-546621 can lead to a crash of the PostgreSQL daemon, resulting in service disruption.