CVE-2015-3166

The snprintf implementation in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 does not properly handle system-call errors, which allows attackers to obtain sensitive information or have other unspecified impact via unknown vectors, as demonstrated by an out-of-memory error.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*

History

21 Nov 2024, 02:28

Type Values Removed Values Added
References () http://ubuntu.com/usn/usn-2621-1 - Third Party Advisory () http://ubuntu.com/usn/usn-2621-1 - Third Party Advisory
References () http://www.debian.org/security/2015/dsa-3269 - Third Party Advisory () http://www.debian.org/security/2015/dsa-3269 - Third Party Advisory
References () http://www.debian.org/security/2015/dsa-3270 - Third Party Advisory () http://www.debian.org/security/2015/dsa-3270 - Third Party Advisory
References () http://www.postgresql.org/about/news/1587/ - Vendor Advisory () http://www.postgresql.org/about/news/1587/ - Vendor Advisory
References () http://www.postgresql.org/docs/9.0/static/release-9-0-20.html - Release Notes, Vendor Advisory () http://www.postgresql.org/docs/9.0/static/release-9-0-20.html - Release Notes, Vendor Advisory
References () http://www.postgresql.org/docs/9.1/static/release-9-1-16.html - Release Notes, Vendor Advisory () http://www.postgresql.org/docs/9.1/static/release-9-1-16.html - Release Notes, Vendor Advisory
References () http://www.postgresql.org/docs/9.2/static/release-9-2-11.html - Release Notes, Vendor Advisory () http://www.postgresql.org/docs/9.2/static/release-9-2-11.html - Release Notes, Vendor Advisory
References () http://www.postgresql.org/docs/9.3/static/release-9-3-7.html - Release Notes, Vendor Advisory () http://www.postgresql.org/docs/9.3/static/release-9-3-7.html - Release Notes, Vendor Advisory
References () http://www.postgresql.org/docs/9.4/static/release-9-4-2.html - Release Notes, Vendor Advisory () http://www.postgresql.org/docs/9.4/static/release-9-4-2.html - Release Notes, Vendor Advisory

Information

Published : 2019-11-20 21:15

Updated : 2024-11-21 02:28


NVD link : CVE-2015-3166

Mitre link : CVE-2015-3166

CVE.ORG link : CVE-2015-3166


JSON object : View

Products Affected

debian

  • debian_linux

postgresql

  • postgresql

canonical

  • ubuntu_linux
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer