Lucene search

K
cve[email protected]CVE-2014-0066
HistoryMar 31, 2014 - 2:58 p.m.

CVE-2014-0066

2014-03-3114:58:15
CWE-20
web.nvd.nist.gov
257
postgresql
chkpass
extension
cve-2014-0066
nvd
denial of service
remote
authentication
null pointer
crash

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:N/I:N/A:P

4.8 Medium

AI Score

Confidence

Low

0.046 Low

EPSS

Percentile

92.6%

The chkpass extension in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 does not properly check the return value of the crypt library function, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via unspecified vectors.

Affected configurations

NVD
Node
postgresqlpostgresqlRange8.4.19
OR
postgresqlpostgresqlMatch8.4.1
OR
postgresqlpostgresqlMatch8.4.2
OR
postgresqlpostgresqlMatch8.4.3
OR
postgresqlpostgresqlMatch8.4.4
OR
postgresqlpostgresqlMatch8.4.5
OR
postgresqlpostgresqlMatch8.4.6
OR
postgresqlpostgresqlMatch8.4.7
OR
postgresqlpostgresqlMatch8.4.8
OR
postgresqlpostgresqlMatch8.4.9
OR
postgresqlpostgresqlMatch8.4.10
OR
postgresqlpostgresqlMatch8.4.11
OR
postgresqlpostgresqlMatch8.4.12
OR
postgresqlpostgresqlMatch8.4.13
OR
postgresqlpostgresqlMatch8.4.14
OR
postgresqlpostgresqlMatch8.4.15
OR
postgresqlpostgresqlMatch8.4.16
OR
postgresqlpostgresqlMatch8.4.17
OR
postgresqlpostgresqlMatch8.4.18
OR
postgresqlpostgresqlMatch9.0
OR
postgresqlpostgresqlMatch9.0.1
OR
postgresqlpostgresqlMatch9.0.2
OR
postgresqlpostgresqlMatch9.0.3
OR
postgresqlpostgresqlMatch9.0.4
OR
postgresqlpostgresqlMatch9.0.5
OR
postgresqlpostgresqlMatch9.0.6
OR
postgresqlpostgresqlMatch9.0.7
OR
postgresqlpostgresqlMatch9.0.8
OR
postgresqlpostgresqlMatch9.0.9
OR
postgresqlpostgresqlMatch9.0.10
OR
postgresqlpostgresqlMatch9.0.11
OR
postgresqlpostgresqlMatch9.0.12
OR
postgresqlpostgresqlMatch9.0.13
OR
postgresqlpostgresqlMatch9.0.14
OR
postgresqlpostgresqlMatch9.0.15
OR
postgresqlpostgresqlMatch9.1
OR
postgresqlpostgresqlMatch9.1.1
OR
postgresqlpostgresqlMatch9.1.2
OR
postgresqlpostgresqlMatch9.1.3
OR
postgresqlpostgresqlMatch9.1.4
OR
postgresqlpostgresqlMatch9.1.5
OR
postgresqlpostgresqlMatch9.1.6
OR
postgresqlpostgresqlMatch9.1.7
OR
postgresqlpostgresqlMatch9.1.8
OR
postgresqlpostgresqlMatch9.1.9
OR
postgresqlpostgresqlMatch9.1.10
OR
postgresqlpostgresqlMatch9.1.11
OR
postgresqlpostgresqlMatch9.2
OR
postgresqlpostgresqlMatch9.2.1
OR
postgresqlpostgresqlMatch9.2.2
OR
postgresqlpostgresqlMatch9.2.3
OR
postgresqlpostgresqlMatch9.2.4
OR
postgresqlpostgresqlMatch9.2.5
OR
postgresqlpostgresqlMatch9.2.6
OR
postgresqlpostgresqlMatch9.3
OR
postgresqlpostgresqlMatch9.3.1
OR
postgresqlpostgresqlMatch9.3.2

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:N/I:N/A:P

4.8 Medium

AI Score

Confidence

Low

0.046 Low

EPSS

Percentile

92.6%