Heap-based Buffer Overflow Affecting postgresql-docs package, versions <0:8.4.20-2.el6_6
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL6-POSTGRESQLDOCS-1493782
- published 26 Jul 2021
- disclosed 16 Feb 2015
Introduced: 16 Feb 2015
CVE-2015-0241 Open this link in a new tabHow to fix?
Upgrade RHEL:6 postgresql-docs to version 0:8.4.20-2.el6_6 or higher.
This issue was patched in RHSA-2015:0750.
NVD Description
Note: Versions mentioned in the description apply only to the upstream postgresql-docs package and not the postgresql-docs package as distributed by RHEL.
See How to fix? for RHEL:6 relevant fixed versions and status.
The to_char function in PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a (1) large number of digits when processing a numeric formatting template, which triggers a buffer over-read, or (2) crafted timestamp formatting template, which triggers a buffer overflow.
References
- http://www.debian.org/security/2015/dsa-3155
- http://www.postgresql.org/about/news/1569/
- http://www.postgresql.org/docs/9.4/static/release-9-4-1.html
- http://www.postgresql.org/docs/current/static/release-9-0-19.html
- http://www.postgresql.org/docs/current/static/release-9-1-15.html
- http://www.postgresql.org/docs/current/static/release-9-2-10.html
- http://www.postgresql.org/docs/current/static/release-9-3-6.html
- https://access.redhat.com/security/cve/CVE-2015-0241
- https://access.redhat.com/errata/RHSA-2015:0750