CVE-2015-0241Classic Buffer Overflow in Postgresql

Severity
8.8HIGHNVD
EPSS
6.3%
top 9.02%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 27
Latest updateMay 24

Description

The to_char function in PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a (1) large number of digits when processing a numeric formatting template, which triggers a buffer over-read, or (2) crafted timestamp formatting template, which triggers a buffer overflow.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

NVDpostgresql/postgresql9.1.09.1.15+4

Also affects: Debian Linux 7.0, 8.0

🔴Vulnerability Details

4
GHSA
GHSA-h47p-j4vf-9qhf: The to_char function in PostgreSQL before 92022-05-24
CVEList
CVE-2015-0241: The to_char function in PostgreSQL before 92020-01-27
OSV
postgresql-8.4, postgresql-9.1, postgresql-9.3, postgresql-9.4 vulnerabilities2015-02-11
OSV
CVE-2015-0241: The to_char function in PostgreSQL before 92015-02-06

📋Vendor Advisories

4
Red Hat
postgresql: buffer overflow in the to_char() function2015-02-16
Ubuntu
PostgreSQL vulnerabilities2015-02-11
Apple
CVE-2015-0241: OS X Server v5.0.3
Apple
CVE-2015-0241: OS X Yosemite v10.10.5 and Security Update 2015-006

💬Community

1
Bugzilla
CVE-2015-0241 postgresql: buffer overflow in the to_char() function2015-02-03
CVE-2015-0241 — Classic Buffer Overflow in Postgresql | cvebase