Skip to navigation

CVE Database

CVE-2013-0255

Impact: Moderate
Public: 2013-02-07
Bugzilla: 907892: CVE-2013-0255 postgresql: array indexing error in enum_recv()

Details

The MITRE CVE dictionary describes this issue as:

PostgreSQL 9.2.x before 9.2.3, 9.1.x before 9.1.8, 9.0.x before 9.0.12, 8.4.x before 8.4.16, and 8.3.x before 8.3.23 does not properly declare the enum_recv function in backend/utils/adt/enum.c, which causes it to be invoked with incorrect arguments and allows remote authenticated users to cause a denial of service (server crash) or read sensitive process memory via a crafted SQL command, which triggers an array index error and an out-of-bounds read.

Find out more about CVE-2013-0255 from the MITRE CVE dictionary and NIST NVD.

Statement

This issue did not affect the version of postgresql, as shipped with Red Hat Enterprise Linux 5. This issue affects the version of postgresql84, as shipped with Red Hat Enterprise Linux 5 and the version of postgresql, as shipped with Red Hat Enterprise Linux 6. Red Hat Security Response Team has rated this issue as having moderate security impact. A future update might address this flaw. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

CVSS v2 metrics

Base Score: 5.5
Base Metrics: AV:N/AC:L/Au:S/C:P/I:N/A:P
Access Vector: Network
Access Complexity: Low
Authentication: Single Instance
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat security errata

Platform Errata Release Date
Red Hat Enterprise Linux version 5 (postgresql84) RHSA-2013:1475 October 29, 2013
Red Hat Enterprise Linux version 6 (postgresql) RHSA-2013:1475 October 29, 2013

External References

Acknowledgements

Red Hat would like to thank the PostgreSQL project for reporting this issue. Upstream acknowledges Sumit Soni via Secunia SVCRP as the original issue reporter.

This page is generated automatically and has not been checked for errors or omissions.

For clarification or corrections please contact the Red Hat Security Response Team.