CVE-2019-10164 — Stack-based Buffer Overflow in Postgresql
Severity
8.8HIGHNVD
EPSS
13.4%
top 5.79%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 26
Latest updateMay 24
Description
PostgreSQL versions 10.x before 10.9 and versions 11.x before 11.4 are vulnerable to a stack-based buffer overflow. Any authenticated user can overflow a stack-based buffer by changing the user's own password to a purpose-crafted value. This often suffices to execute arbitrary code as the PostgreSQL operating system account.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9
Affected Packages4 packages
Also affects: Fedora 29, 30, Enterprise Linux 8.0
🔴Vulnerability Details
2📋Vendor Advisories
2💬Community
4Bugzilla▶
CVE-2019-10164 mingw-postgresql: PostgreSQL: stack-based buffer overflow via setting a password [fedora-all]↗2019-06-24
Bugzilla▶
CVE-2019-10164 mingw-postgresql: PostgreSQL: stack-based buffer overflow via setting a password [epel-7]↗2019-06-24
Bugzilla▶
CVE-2019-10164 postgresql: stack-based buffer overflow via setting a password [fedora-all]↗2019-06-24