Lucene search

K
cve[email protected]CVE-2014-0063
HistoryMar 31, 2014 - 2:58 p.m.

CVE-2014-0063

2014-03-3114:58:15
CWE-119
web.nvd.nist.gov
151
cve-2014-0063
postgresql
buffer overflow
remote code execution
denial of service

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

6.4 Medium

AI Score

Confidence

Low

0.927 High

EPSS

Percentile

99.0%

Multiple stack-based buffer overflows in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via vectors related to an incorrect MAXDATELEN constant and datetime values involving (1) intervals, (2) timestamps, or (3) timezones, a different vulnerability than CVE-2014-0065.

Affected configurations

NVD
Node
postgresqlpostgresqlRange8.4.19
OR
postgresqlpostgresqlMatch8.4.1
OR
postgresqlpostgresqlMatch8.4.2
OR
postgresqlpostgresqlMatch8.4.3
OR
postgresqlpostgresqlMatch8.4.4
OR
postgresqlpostgresqlMatch8.4.5
OR
postgresqlpostgresqlMatch8.4.6
OR
postgresqlpostgresqlMatch8.4.7
OR
postgresqlpostgresqlMatch8.4.8
OR
postgresqlpostgresqlMatch8.4.9
OR
postgresqlpostgresqlMatch8.4.10
OR
postgresqlpostgresqlMatch8.4.11
OR
postgresqlpostgresqlMatch8.4.12
OR
postgresqlpostgresqlMatch8.4.13
OR
postgresqlpostgresqlMatch8.4.14
OR
postgresqlpostgresqlMatch8.4.15
OR
postgresqlpostgresqlMatch8.4.16
OR
postgresqlpostgresqlMatch8.4.17
OR
postgresqlpostgresqlMatch8.4.18
OR
postgresqlpostgresqlMatch9.0
OR
postgresqlpostgresqlMatch9.0.1
OR
postgresqlpostgresqlMatch9.0.2
OR
postgresqlpostgresqlMatch9.0.3
OR
postgresqlpostgresqlMatch9.0.4
OR
postgresqlpostgresqlMatch9.0.5
OR
postgresqlpostgresqlMatch9.0.6
OR
postgresqlpostgresqlMatch9.0.7
OR
postgresqlpostgresqlMatch9.0.8
OR
postgresqlpostgresqlMatch9.0.9
OR
postgresqlpostgresqlMatch9.0.10
OR
postgresqlpostgresqlMatch9.0.11
OR
postgresqlpostgresqlMatch9.0.12
OR
postgresqlpostgresqlMatch9.0.13
OR
postgresqlpostgresqlMatch9.0.14
OR
postgresqlpostgresqlMatch9.0.15
OR
postgresqlpostgresqlMatch9.1
OR
postgresqlpostgresqlMatch9.1.1
OR
postgresqlpostgresqlMatch9.1.2
OR
postgresqlpostgresqlMatch9.1.3
OR
postgresqlpostgresqlMatch9.1.4
OR
postgresqlpostgresqlMatch9.1.5
OR
postgresqlpostgresqlMatch9.1.6
OR
postgresqlpostgresqlMatch9.1.7
OR
postgresqlpostgresqlMatch9.1.8
OR
postgresqlpostgresqlMatch9.1.9
OR
postgresqlpostgresqlMatch9.1.10
OR
postgresqlpostgresqlMatch9.1.11
OR
postgresqlpostgresqlMatch9.2
OR
postgresqlpostgresqlMatch9.2.1
OR
postgresqlpostgresqlMatch9.2.2
OR
postgresqlpostgresqlMatch9.2.3
OR
postgresqlpostgresqlMatch9.2.4
OR
postgresqlpostgresqlMatch9.2.5
OR
postgresqlpostgresqlMatch9.2.6
OR
postgresqlpostgresqlMatch9.3
OR
postgresqlpostgresqlMatch9.3.1
OR
postgresqlpostgresqlMatch9.3.2

References

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

6.4 Medium

AI Score

Confidence

Low

0.927 High

EPSS

Percentile

99.0%