← Zuruck zu CVEs
CVE-2014-0064
N/ABeschreibung
Multiple integer overflows in the path_in and other unspecified functions in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, which trigger a buffer overflow. NOTE: this identifier has been SPLIT due to different affected versions; use CVE-2014-2669 for the hstore vector.
CVE Details
CVSS v3.1 BewertungN/A
Veroffentlicht3/31/2014
Zuletzt geandert4/12/2025
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
postgresql:postgresql
Schwachen (CWE)
CWE-189
Referenzen
http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html(secalert@redhat.com)
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705(secalert@redhat.com)
http://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html(secalert@redhat.com)
http://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html(secalert@redhat.com)
http://rhn.redhat.com/errata/RHSA-2014-0211.html(secalert@redhat.com)
http://rhn.redhat.com/errata/RHSA-2014-0221.html(secalert@redhat.com)
http://rhn.redhat.com/errata/RHSA-2014-0249.html(secalert@redhat.com)
http://rhn.redhat.com/errata/RHSA-2014-0469.html(secalert@redhat.com)
http://secunia.com/advisories/61307(secalert@redhat.com)
http://support.apple.com/kb/HT6448(secalert@redhat.com)
http://wiki.postgresql.org/wiki/20140220securityrelease(secalert@redhat.com)
http://www.debian.org/security/2014/dsa-2864(secalert@redhat.com)
http://www.debian.org/security/2014/dsa-2865(secalert@redhat.com)
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html(secalert@redhat.com)
http://www.postgresql.org/about/news/1506/(secalert@redhat.com)
http://www.postgresql.org/support/security/(secalert@redhat.com)
http://www.securityfocus.com/bid/65725(secalert@redhat.com)
http://www.ubuntu.com/usn/USN-2120-1(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=1065230(secalert@redhat.com)
https://github.com/postgres/postgres/commit/31400a673325147e1205326008e32135a78b4d8a(secalert@redhat.com)
https://support.apple.com/kb/HT6536(secalert@redhat.com)
http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html(af854a3a-2127-422b-91ae-364da2661108)
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2014-0211.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2014-0221.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2014-0249.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2014-0469.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/61307(af854a3a-2127-422b-91ae-364da2661108)
http://support.apple.com/kb/HT6448(af854a3a-2127-422b-91ae-364da2661108)
http://wiki.postgresql.org/wiki/20140220securityrelease(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2014/dsa-2864(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2014/dsa-2865(af854a3a-2127-422b-91ae-364da2661108)
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.postgresql.org/about/news/1506/(af854a3a-2127-422b-91ae-364da2661108)
http://www.postgresql.org/support/security/(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/65725(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-2120-1(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=1065230(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/postgres/postgres/commit/31400a673325147e1205326008e32135a78b4d8a(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/kb/HT6536(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.