All the vulnerabilites related to debian - libdbd-pg-perl
cve-2009-1341
Vulnerability from cvelistv5
Published
2009-04-30 20:00
Modified
2024-08-07 05:13
Severity ?
Summary
Memory leak in the dequote_bytea function in quote.c in the DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module before 2.0.0 for Perl allows context-dependent attackers to cause a denial of service (memory consumption) by fetching data with BYTEA columns.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:13:24.824Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2009:1067",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2009-1067.html"
          },
          {
            "name": "34757",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34757"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://security.debian.org/pool/updates/main/libd/libdbd-pg-perl/libdbd-pg-perl_1.49-2+etch1.diff.gz"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://launchpad.net/bugs/cve/2009-1341"
          },
          {
            "name": "34909",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34909"
          },
          {
            "name": "RHSA-2009:0479",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2009-0479.html"
          },
          {
            "name": "35685",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35685"
          },
          {
            "name": "oval:org.mitre.oval:def:9680",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9680"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://cpansearch.perl.org/src/TURNSTEP/DBD-Pg-2.13.1/Changes"
          },
          {
            "name": "DSA-1780",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1780"
          },
          {
            "name": "SUSE-SR:2009:012",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html"
          },
          {
            "name": "35058",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35058"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://rt.cpan.org/Public/Bug/Display.html?id=21392"
          },
          {
            "name": "libdbdpgperl-dequotebytea-dos(50387)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50387"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-04-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Memory leak in the dequote_bytea function in quote.c in the DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module before 2.0.0 for Perl allows context-dependent attackers to cause a denial of service (memory consumption) by fetching data with BYTEA columns."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "RHSA-2009:1067",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2009-1067.html"
        },
        {
          "name": "34757",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34757"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://security.debian.org/pool/updates/main/libd/libdbd-pg-perl/libdbd-pg-perl_1.49-2+etch1.diff.gz"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://launchpad.net/bugs/cve/2009-1341"
        },
        {
          "name": "34909",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34909"
        },
        {
          "name": "RHSA-2009:0479",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2009-0479.html"
        },
        {
          "name": "35685",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35685"
        },
        {
          "name": "oval:org.mitre.oval:def:9680",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9680"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://cpansearch.perl.org/src/TURNSTEP/DBD-Pg-2.13.1/Changes"
        },
        {
          "name": "DSA-1780",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1780"
        },
        {
          "name": "SUSE-SR:2009:012",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html"
        },
        {
          "name": "35058",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35058"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://rt.cpan.org/Public/Bug/Display.html?id=21392"
        },
        {
          "name": "libdbdpgperl-dequotebytea-dos(50387)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50387"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-1341",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Memory leak in the dequote_bytea function in quote.c in the DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module before 2.0.0 for Perl allows context-dependent attackers to cause a denial of service (memory consumption) by fetching data with BYTEA columns."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "RHSA-2009:1067",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2009-1067.html"
            },
            {
              "name": "34757",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34757"
            },
            {
              "name": "http://security.debian.org/pool/updates/main/libd/libdbd-pg-perl/libdbd-pg-perl_1.49-2+etch1.diff.gz",
              "refsource": "CONFIRM",
              "url": "http://security.debian.org/pool/updates/main/libd/libdbd-pg-perl/libdbd-pg-perl_1.49-2+etch1.diff.gz"
            },
            {
              "name": "https://launchpad.net/bugs/cve/2009-1341",
              "refsource": "MISC",
              "url": "https://launchpad.net/bugs/cve/2009-1341"
            },
            {
              "name": "34909",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34909"
            },
            {
              "name": "RHSA-2009:0479",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2009-0479.html"
            },
            {
              "name": "35685",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35685"
            },
            {
              "name": "oval:org.mitre.oval:def:9680",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9680"
            },
            {
              "name": "http://cpansearch.perl.org/src/TURNSTEP/DBD-Pg-2.13.1/Changes",
              "refsource": "CONFIRM",
              "url": "http://cpansearch.perl.org/src/TURNSTEP/DBD-Pg-2.13.1/Changes"
            },
            {
              "name": "DSA-1780",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2009/dsa-1780"
            },
            {
              "name": "SUSE-SR:2009:012",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html"
            },
            {
              "name": "35058",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35058"
            },
            {
              "name": "http://rt.cpan.org/Public/Bug/Display.html?id=21392",
              "refsource": "CONFIRM",
              "url": "http://rt.cpan.org/Public/Bug/Display.html?id=21392"
            },
            {
              "name": "libdbdpgperl-dequotebytea-dos(50387)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50387"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-1341",
    "datePublished": "2009-04-30T20:00:00",
    "dateReserved": "2009-04-17T00:00:00",
    "dateUpdated": "2024-08-07T05:13:24.824Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2009-04-30 20:30
Modified
2024-11-21 01:02
Severity ?
Summary
Memory leak in the dequote_bytea function in quote.c in the DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module before 2.0.0 for Perl allows context-dependent attackers to cause a denial of service (memory consumption) by fetching data with BYTEA columns.
References
cve@mitre.orghttp://cpansearch.perl.org/src/TURNSTEP/DBD-Pg-2.13.1/Changes
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html
cve@mitre.orghttp://rt.cpan.org/Public/Bug/Display.html?id=21392
cve@mitre.orghttp://secunia.com/advisories/34909Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/35058Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/35685
cve@mitre.orghttp://security.debian.org/pool/updates/main/libd/libdbd-pg-perl/libdbd-pg-perl_1.49-2+etch1.diff.gz
cve@mitre.orghttp://www.debian.org/security/2009/dsa-1780
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2009-0479.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2009-1067.html
cve@mitre.orghttp://www.securityfocus.com/bid/34757
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/50387
cve@mitre.orghttps://launchpad.net/bugs/cve/2009-1341
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9680
af854a3a-2127-422b-91ae-364da2661108http://cpansearch.perl.org/src/TURNSTEP/DBD-Pg-2.13.1/Changes
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html
af854a3a-2127-422b-91ae-364da2661108http://rt.cpan.org/Public/Bug/Display.html?id=21392
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34909Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/35058Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/35685
af854a3a-2127-422b-91ae-364da2661108http://security.debian.org/pool/updates/main/libd/libdbd-pg-perl/libdbd-pg-perl_1.49-2+etch1.diff.gz
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2009/dsa-1780
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2009-0479.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2009-1067.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/34757
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/50387
af854a3a-2127-422b-91ae-364da2661108https://launchpad.net/bugs/cve/2009-1341
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9680
Impacted products
Vendor Product Version
debian libdbd-pg-perl *
debian libdbd-pg-perl 0.1
debian libdbd-pg-perl 0.2
debian libdbd-pg-perl 0.3
debian libdbd-pg-perl 0.4
debian libdbd-pg-perl 0.5
debian libdbd-pg-perl 0.51
debian libdbd-pg-perl 0.52
debian libdbd-pg-perl 0.61
debian libdbd-pg-perl 0.62
debian libdbd-pg-perl 0.63
debian libdbd-pg-perl 0.64
debian libdbd-pg-perl 0.65
debian libdbd-pg-perl 0.66
debian libdbd-pg-perl 0.67
debian libdbd-pg-perl 0.68
debian libdbd-pg-perl 0.69
debian libdbd-pg-perl 0.70
debian libdbd-pg-perl 0.71
debian libdbd-pg-perl 0.72
debian libdbd-pg-perl 0.73
debian libdbd-pg-perl 0.80
debian libdbd-pg-perl 0.81
debian libdbd-pg-perl 0.82
debian libdbd-pg-perl 0.83
debian libdbd-pg-perl 0.84
debian libdbd-pg-perl 0.85
debian libdbd-pg-perl 0.86
debian libdbd-pg-perl 0.87
debian libdbd-pg-perl 0.88
debian libdbd-pg-perl 0.89
debian libdbd-pg-perl 0.90
debian libdbd-pg-perl 0.91
debian libdbd-pg-perl 0.92
debian libdbd-pg-perl 0.93
debian libdbd-pg-perl 0.94
debian libdbd-pg-perl 0.95
debian libdbd-pg-perl 0.96
debian libdbd-pg-perl 0.97
debian libdbd-pg-perl 0.98
debian libdbd-pg-perl 0.99
debian libdbd-pg-perl 1.0.0
debian libdbd-pg-perl 1.0.1
debian libdbd-pg-perl 1.2.0
debian libdbd-pg-perl 1.2.1
debian libdbd-pg-perl 1.2.2
debian libdbd-pg-perl 1.3.1
debian libdbd-pg-perl 1.3.2
debian libdbd-pg-perl 1.4.0
debian libdbd-pg-perl 1.4.1
debian libdbd-pg-perl 1.4.2
debian libdbd-pg-perl 1.4.3
debian libdbd-pg-perl 1.4.4
debian libdbd-pg-perl 1.4.5
debian libdbd-pg-perl 1.4.6
debian libdbd-pg-perl 1.4.7
debian libdbd-pg-perl 1.4.8



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FA7647E-4058-4E2B-AFF8-01BBAB1D1B87",
              "versionEndIncluding": "1.4.9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "613612A7-EC67-4B63-89AB-0A844D1A8782",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E75CE2-B819-46BF-ABE9-83C32B22EC42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "638D9B29-C654-41E4-AB2D-0047D55673DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E024E548-2D2D-4651-808D-5C0010C13063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C53713A-8B3E-483C-B0B2-1B26C550EB19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:0.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E5750AA-0347-4A14-B5E9-BA60AFAD26AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3630BEA-0EDD-4B42-B652-ACE8E501FF29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:0.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "35306D81-3690-4082-8CE3-77512B4F1791",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:0.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "72323A75-2F6F-4D22-9B5C-4691DF6918BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:0.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CACFAD2-226E-4DC0-A426-305BB4AF573B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:0.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C0B881F-AC4B-4A71-8E1B-051549E5D22B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:0.65:*:*:*:*:*:*:*",
              "matchCriteriaId": "97BA119B-A2BA-4133-BA38-841107A1B404",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:0.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5A4793D-CE46-4E87-835A-AE99B3087331",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:0.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DA32921-F742-4972-9596-23CCEC98009E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:0.68:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A3F494B-D2FB-4DF5-8346-7DEBC6A15C1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:0.69:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7E0581B-E46B-4D31-B6EF-6B961A149324",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:0.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0E3784A-BAB6-4E1F-BDC8-02471EB9E9FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:0.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "67394C79-025F-4756-847C-37CB48DD6337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:0.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "26B1B340-723C-423C-B08D-7D5A3D0E69CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:0.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CD390BD-E49E-4982-BC14-70D893F18DFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:0.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "036A1EB2-AFA1-4279-90C2-B8F69DB44D63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:0.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DC4E34A-1D5D-4C32-A1DD-AAC168E0AB49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:0.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9469A86-BDF3-4266-8390-C8E9994ACB1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:0.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F6BB8AB-F316-46F4-A385-F6CAB8BEAAD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:0.84:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC597EB3-913B-40F5-A693-BC49BB89AB2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:0.85:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B35351C-8CE9-4AB6-A4C1-AB01E6A60197",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:0.86:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA32BC37-7FDB-43A1-BE17-77D2F82871F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:0.87:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADF1C3F4-8C2B-40DA-A8AF-D1492AAD92D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:0.88:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFA29146-FB2E-457F-9B79-3C059E659313",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:0.89:*:*:*:*:*:*:*",
              "matchCriteriaId": "64D8C17D-6D35-49FC-83F2-968E6CA28CB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:0.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "A568FEB3-4852-4BCE-ADDE-749A216E995C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:0.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "753CD595-49CD-48BD-980B-415DDBC4492C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:0.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C74BC7E-18C0-4399-9240-6A000B23B91A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:0.93:*:*:*:*:*:*:*",
              "matchCriteriaId": "190E89EA-61AE-4EB8-ACBB-4E4FE39ABB6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:0.94:*:*:*:*:*:*:*",
              "matchCriteriaId": "5532D0CB-7001-4C8E-80BF-54EAD32E8A40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:0.95:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9F54A01-AEFA-4426-977E-677970FE3025",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:0.96:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7EDF0F1-D0DB-4D84-82DD-8E65E129CD08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:0.97:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CCD9E8F-8456-4513-A291-70DA11CF6E1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:0.98:*:*:*:*:*:*:*",
              "matchCriteriaId": "51B2F3E1-2D73-499C-A971-31679EE07E3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:0.99:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4905713-30CC-4327-A6D8-FACE14B362E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "681E2741-C68B-4AED-BAB5-DFC78F10FF36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AEF38D8-073C-427D-B4BE-54FF4272054F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E6031E9-B041-43B9-B3C1-796086925821",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BEE07CF-260D-4BAF-A1E6-91941293E16E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "50E810D1-7D96-47E2-83F9-44FF8938BABC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A150EC9-2A91-4221-870C-A6B6C3533516",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FC742FA-EC42-4812-9788-C482DF2A1C4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F55C4ECC-ACC8-444B-9DA6-F115659C2D58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2092056-CEC1-41EA-B10E-C5519113982E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B8CF3B9-6980-47C9-A15A-DC2E3A53A6A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "875393EA-EADB-4F58-803D-A9FCA1C4B233",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:1.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F918396-10B5-430F-A046-7EBBA9B58E58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:1.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "28F79BE3-82EC-4643-8D76-74577AC0A0DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:1.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE351E89-6E8B-499A-BE04-8CDFDF105DA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "43AE9FD7-E718-47BA-AFF1-920F560CDC42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:debian:libdbd-pg-perl:1.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "42EF22B1-A736-4A9E-A91F-2B60D2182440",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Memory leak in the dequote_bytea function in quote.c in the DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module before 2.0.0 for Perl allows context-dependent attackers to cause a denial of service (memory consumption) by fetching data with BYTEA columns."
    },
    {
      "lang": "es",
      "value": "Fuga de memoria en la funci\u00f3n dequote_bytea en quote.c en el m\u00f3dulo DBD::Pg (alias DBD-Pg o libdbd-pg-perl) anterior a v2.0.0 para Perl permite a atacantes, dependiendo del contexto, causar una denegaci\u00f3n de servicio (consumo de memoria) obteniendo los datos con columnas BYTEA."
    }
  ],
  "id": "CVE-2009-1341",
  "lastModified": "2024-11-21T01:02:14.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-04-30T20:30:00.437",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://cpansearch.perl.org/src/TURNSTEP/DBD-Pg-2.13.1/Changes"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://rt.cpan.org/Public/Bug/Display.html?id=21392"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34909"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35058"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/35685"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.debian.org/pool/updates/main/libd/libdbd-pg-perl/libdbd-pg-perl_1.49-2+etch1.diff.gz"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2009/dsa-1780"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2009-0479.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2009-1067.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/34757"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50387"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://launchpad.net/bugs/cve/2009-1341"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9680"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://cpansearch.perl.org/src/TURNSTEP/DBD-Pg-2.13.1/Changes"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rt.cpan.org/Public/Bug/Display.html?id=21392"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34909"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35058"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/35685"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.debian.org/pool/updates/main/libd/libdbd-pg-perl/libdbd-pg-perl_1.49-2+etch1.diff.gz"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2009/dsa-1780"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2009-0479.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2009-1067.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/34757"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50387"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://launchpad.net/bugs/cve/2009-1341"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9680"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}