SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Database)  >   PostgreSQL Vendors:   postgresql.org
PostgreSQL Array Index Error Lets Remote Authenticated Users Deny Service and Gain Information
SecurityTracker Alert ID:  1028092
SecurityTracker URL:  http://securitytracker.com/id/1028092
CVE Reference:   CVE-2013-0255   (Links to External Site)
Date:  Feb 7 2013
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in PostgreSQL. A remote authenticated user can cause denial of service conditions and may be able to obtain portions of system memory.

A remote authenticated user can send a specially crafted SQL command to trigger an array index error and cause the target service to crash or disclose portions of system memory.

Sumit Soni reported this vulnerability (via Secunia SVCRP).

Impact:   A remote authenticated user can cause the target database server to crash or disclose portions of system memory.
Solution:   The vendor has issued a fix (8.4.16, 9.0.12, 9.1.8, 9.2.3).

The vendor's advisories are available at:

http://www.postgresql.org/docs/8.4/static/release-8-4-16.html
http://www.postgresql.org/docs/9.0/static/release-9-0-12.html
http://www.postgresql.org/docs/9.1/static/release-9-1-8.html
http://www.postgresql.org/docs/9.2/static/release-9-2-3.html

Vendor URL:  www.postgresql.org/docs/9.2/static/release-9-2-3.html (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Apr 10 2013 (Oracle Issues Fix for Solaris) PostgreSQL Array Index Error Lets Remote Authenticated Users Deny Service and Gain Information
Oracle has issued a fix for Solaris 10.
Oct 30 2013 (Red Hat Issues Fix) PostgreSQL Array Index Error Lets Remote Authenticated Users Deny Service and Gain Information
Red Hat has issued a fix for Red Hat Enterprise Linux 5 and 6.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC