Stack-based buffer overflow in the *printf function implementations in PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1, when running on a Windows system, allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a floating point number with a large precision, as demonstrated by using the to_char function.
CPE | Name | Operator | Version |
---|---|---|---|
debian_linux | eq | 8.0 | |
debian_linux | eq | 7.0 | |
postgresql | lt | 9.0.19 | |
postgresql | ge | 9.1.0 | |
postgresql | lt | 9.1.15 | |
postgresql | ge | 9.2.0 | |
postgresql | lt | 9.2.10 | |
postgresql | ge | 9.3.0 | |
postgresql | lt | 9.3.6 | |
postgresql | ge | 9.4.0 |
www.debian.org/security/2015/dsa-3155
www.postgresql.org/about/news/1569/
www.postgresql.org/docs/9.4/static/release-9-4-1.html
www.postgresql.org/docs/current/static/release-9-0-19.html
www.postgresql.org/docs/current/static/release-9-1-15.html
www.postgresql.org/docs/current/static/release-9-2-10.html
www.postgresql.org/docs/current/static/release-9-3-6.html