Lucene search

K
cve[email protected]CVE-2013-0255
HistoryFeb 13, 2013 - 1:55 a.m.

CVE-2013-0255

2013-02-1301:55:04
CWE-20
web.nvd.nist.gov
183
postgresql
cve-2013-0255
security
denial of service
remote authentication
nvd

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:N/I:N/A:C

6.3 Medium

AI Score

Confidence

High

0.016 Low

EPSS

Percentile

87.6%

PostgreSQL 9.2.x before 9.2.3, 9.1.x before 9.1.8, 9.0.x before 9.0.12, 8.4.x before 8.4.16, and 8.3.x before 8.3.23 does not properly declare the enum_recv function in backend/utils/adt/enum.c, which causes it to be invoked with incorrect arguments and allows remote authenticated users to cause a denial of service (server crash) or read sensitive process memory via a crafted SQL command, which triggers an array index error and an out-of-bounds read.

Affected configurations

NVD
Node
postgresqlpostgresqlMatch8.3
OR
postgresqlpostgresqlMatch8.3.1
OR
postgresqlpostgresqlMatch8.3.2
OR
postgresqlpostgresqlMatch8.3.3
OR
postgresqlpostgresqlMatch8.3.4
OR
postgresqlpostgresqlMatch8.3.5
OR
postgresqlpostgresqlMatch8.3.6
OR
postgresqlpostgresqlMatch8.3.7
OR
postgresqlpostgresqlMatch8.3.8
OR
postgresqlpostgresqlMatch8.3.9
OR
postgresqlpostgresqlMatch8.3.10
OR
postgresqlpostgresqlMatch8.3.11
OR
postgresqlpostgresqlMatch8.3.12
OR
postgresqlpostgresqlMatch8.3.13
OR
postgresqlpostgresqlMatch8.3.14
OR
postgresqlpostgresqlMatch8.3.15
OR
postgresqlpostgresqlMatch8.3.16
OR
postgresqlpostgresqlMatch8.3.17
OR
postgresqlpostgresqlMatch8.3.18
OR
postgresqlpostgresqlMatch8.3.19
OR
postgresqlpostgresqlMatch8.3.20
OR
postgresqlpostgresqlMatch8.3.21
OR
postgresqlpostgresqlMatch8.3.22
Node
postgresqlpostgresqlMatch8.4
OR
postgresqlpostgresqlMatch8.4.1
OR
postgresqlpostgresqlMatch8.4.2
OR
postgresqlpostgresqlMatch8.4.3
OR
postgresqlpostgresqlMatch8.4.4
OR
postgresqlpostgresqlMatch8.4.5
OR
postgresqlpostgresqlMatch8.4.6
OR
postgresqlpostgresqlMatch8.4.7
OR
postgresqlpostgresqlMatch8.4.8
OR
postgresqlpostgresqlMatch8.4.9
OR
postgresqlpostgresqlMatch8.4.10
OR
postgresqlpostgresqlMatch8.4.11
OR
postgresqlpostgresqlMatch8.4.12
OR
postgresqlpostgresqlMatch8.4.13
OR
postgresqlpostgresqlMatch8.4.14
OR
postgresqlpostgresqlMatch8.4.15
Node
postgresqlpostgresqlMatch9.0
OR
postgresqlpostgresqlMatch9.0.1
OR
postgresqlpostgresqlMatch9.0.2
OR
postgresqlpostgresqlMatch9.0.3
OR
postgresqlpostgresqlMatch9.0.4
OR
postgresqlpostgresqlMatch9.0.5
OR
postgresqlpostgresqlMatch9.0.6
OR
postgresqlpostgresqlMatch9.0.7
OR
postgresqlpostgresqlMatch9.0.8
OR
postgresqlpostgresqlMatch9.0.9
OR
postgresqlpostgresqlMatch9.0.10
OR
postgresqlpostgresqlMatch9.0.11
Node
postgresqlpostgresqlMatch9.1
OR
postgresqlpostgresqlMatch9.1.1
OR
postgresqlpostgresqlMatch9.1.2
OR
postgresqlpostgresqlMatch9.1.3
OR
postgresqlpostgresqlMatch9.1.4
OR
postgresqlpostgresqlMatch9.1.5
OR
postgresqlpostgresqlMatch9.1.6
OR
postgresqlpostgresqlMatch9.1.7
Node
postgresqlpostgresqlMatch9.2
OR
postgresqlpostgresqlMatch9.2.1
OR
postgresqlpostgresqlMatch9.2.2

References

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:N/I:N/A:C

6.3 Medium

AI Score

Confidence

High

0.016 Low

EPSS

Percentile

87.6%