Stack-based Buffer Overflow Affecting postgresql-test package, versions <0:8.4.7-1.el6_0.1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS6-POSTGRESQLTEST-2042120
- published 26 Jul 2021
- disclosed 1 Feb 2011
Introduced: 1 Feb 2011
CVE-2010-4015 Open this link in a new tabHow to fix?
Upgrade Centos:6 postgresql-test to version 0:8.4.7-1.el6_0.1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream postgresql-test package and not the postgresql-test package as distributed by Centos.
See How to fix? for Centos:6 relevant fixed versions and status.
Buffer overflow in the gettoken function in contrib/intarray/_int_bool.c in the intarray array module in PostgreSQL 9.0.x before 9.0.3, 8.4.x before 8.4.7, 8.3.x before 8.3.14, and 8.2.x before 8.2.20 allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via integers with a large number of digits to unspecified functions.
References
- http://www.securityfocus.com/bid/46084
- http://git.postgresql.org/gitweb?p=postgresql.git;a=commitdiff;h=7ccb6dc2d3e266a551827bb99179708580f72431
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://www.postgresql.org/about/news.1289
- http://www.postgresql.org/support/security
- https://access.redhat.com/security/cve/CVE-2010-4015
- http://www.debian.org/security/2011/dsa-2157
- http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053817.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053888.html
- http://marc.info/?l=bugtraq&m=134124585221119&w=2
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:021
- http://osvdb.org/70740
- http://www.redhat.com/support/errata/RHSA-2011-0197.html
- http://www.redhat.com/support/errata/RHSA-2011-0198.html
- https://access.redhat.com/errata/RHSA-2011:0197
- http://secunia.com/advisories/43144
- http://secunia.com/advisories/43154
- http://secunia.com/advisories/43155
- http://secunia.com/advisories/43187
- http://secunia.com/advisories/43188
- http://secunia.com/advisories/43240
- http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
- http://www.ubuntu.com/usn/USN-1058-1
- http://www.vupen.com/english/advisories/2011/0262
- http://www.vupen.com/english/advisories/2011/0278
- http://www.vupen.com/english/advisories/2011/0283
- http://www.vupen.com/english/advisories/2011/0287
- http://www.vupen.com/english/advisories/2011/0299
- http://www.vupen.com/english/advisories/2011/0303
- http://www.vupen.com/english/advisories/2011/0349
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65060
- http://git.postgresql.org/gitweb?p=postgresql.git%3Ba=commitdiff%3Bh=7ccb6dc2d3e266a551827bb99179708580f72431