Stack-based Buffer Overflow Affecting postgresql-test package, versions <0:8.4.20-1.el6_5
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS6-POSTGRESQLTEST-2095432
- published 26 Jul 2021
- disclosed 17 Feb 2014
Introduced: 17 Feb 2014
CVE-2014-0063 Open this link in a new tabHow to fix?
Upgrade Centos:6 postgresql-test to version 0:8.4.20-1.el6_5 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream postgresql-test package and not the postgresql-test package as distributed by Centos.
See How to fix? for Centos:6 relevant fixed versions and status.
Multiple stack-based buffer overflows in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via vectors related to an incorrect MAXDATELEN constant and datetime values involving (1) intervals, (2) timestamps, or (3) timezones, a different vulnerability than CVE-2014-0065.
References
- http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html
- http://www.securityfocus.com/bid/65719
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- https://bugzilla.redhat.com/show_bug.cgi?id=1065226
- https://github.com/postgres/postgres/commit/4318daecc959886d001a6e79c6ea853e8b1dfb4b
- https://support.apple.com/kb/HT6536
- http://support.apple.com/kb/HT6448
- http://wiki.postgresql.org/wiki/20140220securityrelease
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.postgresql.org/about/news/1506/
- http://www.postgresql.org/support/security/
- https://access.redhat.com/security/cve/CVE-2014-0063
- http://www.debian.org/security/2014/dsa-2864
- http://www.debian.org/security/2014/dsa-2865
- http://rhn.redhat.com/errata/RHSA-2014-0211.html
- http://rhn.redhat.com/errata/RHSA-2014-0221.html
- http://rhn.redhat.com/errata/RHSA-2014-0249.html
- http://rhn.redhat.com/errata/RHSA-2014-0469.html
- https://access.redhat.com/errata/RHSA-2014:0211
- http://secunia.com/advisories/61307
- http://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html
- http://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html
- http://www.ubuntu.com/usn/USN-2120-1