Upstream information
Description
Multiple buffer overflows in gram.y for PostgreSQL 8.0.1 and earlier may allow attackers to execute arbitrary code via (1) a large number of variables in a SQL statement being handled by the read_sql_construct function, (2) a large number of INTO variables in a SELECT statement being handled by the make_select_stmt function, (3) a large number of arbitrary variables in a SELECT statement being handled by the make_select_stmt function, and (4) a large number of INTO variables in a FETCH statement being handled by the make_fetch_stmt function, a different set of vulnerabilities than CVE-2005-0245.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
National Vulnerability Database | |
---|---|
Base Score | 6.5 |
Vector | AV:N/AC:L/Au:S/C:P/I:P/A:P |
Access Vector | Network |
Access Complexity | Low |
Authentication | Single |
Confidentiality Impact | Partial |
Integrity Impact | Partial |
Availability Impact | Partial |
SUSE Security Advisories:
- SUSE-SA:2005:027, published Wed, 20 Apr 2005 09:00:00 +0000
- SUSE-SA:2005:036, published Fri, 24 Jun 2005 12:01:00
- SUSE-SR:2005:005, published Friday, Feb 18th 2005 18:00 MEST
- SUSE-SR:2005:006, published Fri, 25 Feb 2005 15:00:00 +0000
- SUSE-SR:2005:007, published Fri, 04 Mar 2005 16:00:00 +0000
SUSE Timeline for this CVE
CVE page created: Fri Jun 28 00:58:43 2013CVE page last modified: Fri Dec 8 16:11:34 2023