6.5
CVSSv2

CVE-2010-4015

Published: 02/02/2011 Updated: 07/11/2023
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
VMScore: 580
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in the gettoken function in contrib/intarray/_int_bool.c in the intarray array module in PostgreSQL 9.0.x prior to 9.0.3, 8.4.x prior to 8.4.7, 8.3.x prior to 8.3.14, and 8.2.x prior to 8.2.20 allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via integers with a large number of digits to unspecified functions.

Vulnerable Product Search on Vulmon Subscribe to Product

postgresql postgresql 8.3.6

postgresql postgresql 8.3.3

postgresql postgresql 8.3.2

postgresql postgresql 8.3.12

postgresql postgresql 8.3.1

postgresql postgresql 8.3.5

postgresql postgresql 8.3.8

postgresql postgresql 8.3.7

postgresql postgresql 8.3.10

postgresql postgresql 8.3

postgresql postgresql 8.3.4

postgresql postgresql 8.3.11

postgresql postgresql 8.3.9

postgresql postgresql 8.3.13

postgresql postgresql 9.0.1

postgresql postgresql 9.0

postgresql postgresql 9.0.2

postgresql postgresql 8.4.4

postgresql postgresql 8.4.1

postgresql postgresql 8.4.3

postgresql postgresql 8.4.6

postgresql postgresql 8.4

postgresql postgresql 8.4.5

postgresql postgresql 8.4.2

postgresql postgresql 8.2.9

postgresql postgresql 8.2.17

postgresql postgresql 8.2.10

postgresql postgresql 8.2.15

postgresql postgresql 8.2.4

postgresql postgresql 8.2.11

postgresql postgresql 8.2.12

postgresql postgresql 8.2.2

postgresql postgresql 8.2.19

postgresql postgresql 8.2.5

postgresql postgresql 8.2.1

postgresql postgresql 8.2.7

postgresql postgresql 8.2.6

postgresql postgresql 8.2.18

postgresql postgresql 8.2.3

postgresql postgresql 8.2.16

postgresql postgresql 8.2.8

postgresql postgresql 8.2.13

postgresql postgresql 8.2

postgresql postgresql 8.2.14

Vendor Advisories

Geoff Keating reported that a buffer overflow exists in the intarray module’s input function for the query_int type This could allow an attacker to cause a denial of service or possibly execute arbitrary code as the postgres user ...
It was discovered that PostgreSQL's intarray contrib module does not properly handle integers with a large number of digits, leading to a server crash and potentially arbitrary code execution For the stable distribution (lenny), this problem has been fixed in version 8314-0lenny1 of the postgresql-83 package For the testing distribution (squee ...

References

CWE-189http://www.postgresql.org/about/news.1289http://www.postgresql.org/support/securityhttp://www.vupen.com/english/advisories/2011/0262http://secunia.com/advisories/43144http://www.securityfocus.com/bid/46084http://osvdb.org/70740http://www.redhat.com/support/errata/RHSA-2011-0198.htmlhttp://www.vupen.com/english/advisories/2011/0303http://secunia.com/advisories/43188http://secunia.com/advisories/43187http://secunia.com/advisories/43240http://secunia.com/advisories/43155http://www.mandriva.com/security/advisories?name=MDVSA-2011:021http://www.vupen.com/english/advisories/2011/0287http://www.debian.org/security/2011/dsa-2157http://www.vupen.com/english/advisories/2011/0299http://www.vupen.com/english/advisories/2011/0283http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053817.htmlhttp://secunia.com/advisories/43154http://www.vupen.com/english/advisories/2011/0278http://www.ubuntu.com/usn/USN-1058-1http://www.redhat.com/support/errata/RHSA-2011-0197.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2011-February/053888.htmlhttp://www.vupen.com/english/advisories/2011/0349http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.htmlhttp://marc.info/?l=bugtraq&m=134124585221119&w=2http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705https://exchange.xforce.ibmcloud.com/vulnerabilities/65060http://git.postgresql.org/gitweb?p=postgresql.git%3Ba=commitdiff%3Bh=7ccb6dc2d3e266a551827bb99179708580f72431https://usn.ubuntu.com/1058-1/https://nvd.nist.gov