Action not permitted
Modal body text goes here.
cve-2002-0972
Vulnerability from cvelistv5
Published
2002-08-23 04:00
Modified
2024-08-08 03:12
Severity ?
EPSS score ?
Summary
Buffer overflows in PostgreSQL 7.2 allow attackers to cause a denial of service and possibly execute arbitrary code via long arguments to the functions (1) lpad or (2) rpad.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:12:16.676Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "8034", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/8034" }, { "name": "20020820 @(#)Mordred Labs advisory 0x0004: Multiple buffer overflows in PostgreSQL.", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=102987608300785\u0026w=2" }, { "name": "RHSA-2003:001", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-001.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-08-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflows in PostgreSQL 7.2 allow attackers to cause a denial of service and possibly execute arbitrary code via long arguments to the functions (1) lpad or (2) rpad." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "8034", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/8034" }, { "name": "20020820 @(#)Mordred Labs advisory 0x0004: Multiple buffer overflows in PostgreSQL.", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=102987608300785\u0026w=2" }, { "name": "RHSA-2003:001", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-001.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0972", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflows in PostgreSQL 7.2 allow attackers to cause a denial of service and possibly execute arbitrary code via long arguments to the functions (1) lpad or (2) rpad." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "8034", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/8034" }, { "name": "20020820 @(#)Mordred Labs advisory 0x0004: Multiple buffer overflows in PostgreSQL.", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=102987608300785\u0026w=2" }, { "name": "RHSA-2003:001", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-001.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-0972", "datePublished": "2002-08-23T04:00:00", "dateReserved": "2002-08-21T00:00:00", "dateUpdated": "2024-08-08T03:12:16.676Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2002-0972\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2002-09-24T04:00:00.000\",\"lastModified\":\"2016-10-18T02:23:07.083\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Buffer overflows in PostgreSQL 7.2 allow attackers to cause a denial of service and possibly execute arbitrary code via long arguments to the functions (1) lpad or (2) rpad.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de b\u00fafer en PostgreSQL 7.2 permite a atacantes remotos causar una denegaci\u00f3n de servicio y posiblemente ejecutar c\u00f3digo arbitrario mediante argumentos largos en las funciones lpad y rpad.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":4.6},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":true,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:6.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF7D1F6F-044C-478D-991D-D70281FD7C87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:6.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EB98484-1234-4BA2-ACB0-28F4BE684D92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0D16C66-3688-4CF1-8788-F7D7766F04F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:7.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F520EC9F-7B20-4108-B3DC-ABF4947A2D6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:7.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78D324E1-A723-4ECC-A58F-660A5125FD05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95E0614E-0911-43EE-9F3D-2CF87E0F1851\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:7.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFF09CFB-F7CE-4659-BB20-83231539F765\"}]}]}],\"references\":[{\"url\":\"http://marc.info/?l=bugtraq\u0026m=102987608300785\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/8034\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2003-001.html\",\"source\":\"cve@mitre.org\"}]}}" } }
rhsa-2003_001
Vulnerability from csaf_redhat
Published
2003-01-14 22:22
Modified
2024-11-21 22:35
Summary
Red Hat Security Advisory: : Updated PostgreSQL packages fix security issues and bugs
Notes
Topic
Updated PostgreSQL packages are available for Red Hat Linux 7.3 and 8.0.
These packages correct several security and other bugs. A separate
advisory deals with updated PostgreSQL packages for Red Hat Linux 6.2, 7,
7.1, and 7.2.
Details
PostgreSQL is an advanced Object-Relational database management system.
Red Hat Linux 7.3 shipped with PostgreSQL version 7.2.1. Red Hat Linux 8.0
shipped with PostgreSQL version 7.2.2.
PostgreSQL versions 7.2.1 and 7.2.2 contain a serious issue with the VACUUM
command when it is run by a non-superuser. It is possible for the system
to prematurely remove old transaction log data (pg_clog files), which can
result in unrecoverable data loss.
A number of minor security issues affect the PostgreSQL 7.2.1 packages
shipped with Red Hat Linux 7.3 only:
1. Buffer overflows in PostgreSQL 7.2 allow attackers to cause a denial of
service and possibly execute arbitrary code via long arguments to the lpad
or rpad functions. CAN-2002-0972
2. Buffer overflow in the cash_words() function allows local users to cause
a denial of service and possibly execute arbitrary code via a malformed
argument. CAN-2002-1397
3. Buffer overflow in the date parser allows attackers to cause a denial of
service and possibly execute arbitrary code via a long date string, also
known as a vulnerability "in handling long datetime input." CAN-2002-1398
4. Heap-based buffer overflow in the repeat() function allows attackers to
execute arbitrary code by causing repeat() to generate a large string.
CAN-2002-1400
5. Buffer overflows in the TZ and SET TIME ZONE enivronment variables allow
local users to cause a denial of service and possibly execute arbitrary
code. CAN-2002-1402
Additionally, buffer overflows in circle_poly, path_encode and path_add
allow attackers to cause a denial of service and possibly execute arbitrary
code. Note that these overflows have been fixed in our erratum packages and
in PostgreSQL CVS, but are not fixed in the released versions of PostgreSQL
version 7.2.3. CAN-2002-1401
The above vulnerabilities are only critical on open or shared systems
because connecting to the database is required before the vulnerabilities
can be exploited.
This update also contains fixes for several other PostgreSQL bugs,
including handling of pre-1970 date values in newer versions of glibc,
possible server shutdown hangs, spinlock hangs on SMP PPC machines, and
pg_dump improperly dumping with the FULL JOIN USING clauses.
All users of PostgreSQL should upgrade to these errata packages containing
PostgreSQL 7.2.3 with additional patches to correct all these issues. Note
that running initdb is not necessary when upgrading from 7.2.1 or 7.2.2 to
the packages contained in this errata.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated PostgreSQL packages are available for Red Hat Linux 7.3 and 8.0.\nThese packages correct several security and other bugs. A separate\nadvisory deals with updated PostgreSQL packages for Red Hat Linux 6.2, 7,\n7.1, and 7.2.", "title": "Topic" }, { "category": "general", "text": "PostgreSQL is an advanced Object-Relational database management system. \nRed Hat Linux 7.3 shipped with PostgreSQL version 7.2.1. Red Hat Linux 8.0\nshipped with PostgreSQL version 7.2.2.\n\nPostgreSQL versions 7.2.1 and 7.2.2 contain a serious issue with the VACUUM\ncommand when it is run by a non-superuser. It is possible for the system\nto prematurely remove old transaction log data (pg_clog files), which can\nresult in unrecoverable data loss.\n\nA number of minor security issues affect the PostgreSQL 7.2.1 packages\nshipped with Red Hat Linux 7.3 only:\n\n1. Buffer overflows in PostgreSQL 7.2 allow attackers to cause a denial of\nservice and possibly execute arbitrary code via long arguments to the lpad\nor rpad functions. CAN-2002-0972\n \n2. Buffer overflow in the cash_words() function allows local users to cause\na denial of service and possibly execute arbitrary code via a malformed\nargument. CAN-2002-1397\n\n3. Buffer overflow in the date parser allows attackers to cause a denial of\nservice and possibly execute arbitrary code via a long date string, also\nknown as a vulnerability \"in handling long datetime input.\" CAN-2002-1398\n\n4. Heap-based buffer overflow in the repeat() function allows attackers to\nexecute arbitrary code by causing repeat() to generate a large string.\nCAN-2002-1400\n\n5. Buffer overflows in the TZ and SET TIME ZONE enivronment variables allow\nlocal users to cause a denial of service and possibly execute arbitrary\ncode. CAN-2002-1402\n\nAdditionally, buffer overflows in circle_poly, path_encode and path_add\nallow attackers to cause a denial of service and possibly execute arbitrary\ncode. Note that these overflows have been fixed in our erratum packages and\nin PostgreSQL CVS, but are not fixed in the released versions of PostgreSQL\nversion 7.2.3. CAN-2002-1401\n\nThe above vulnerabilities are only critical on open or shared systems\nbecause connecting to the database is required before the vulnerabilities\ncan be exploited. \n\nThis update also contains fixes for several other PostgreSQL bugs,\nincluding handling of pre-1970 date values in newer versions of glibc,\npossible server shutdown hangs, spinlock hangs on SMP PPC machines, and\npg_dump improperly dumping with the FULL JOIN USING clauses.\n\nAll users of PostgreSQL should upgrade to these errata packages containing\nPostgreSQL 7.2.3 with additional patches to correct all these issues. Note\nthat running initdb is not necessary when upgrading from 7.2.1 or 7.2.2 to\nthe packages contained in this errata.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2003:001", "url": "https://access.redhat.com/errata/RHSA-2003:001" }, { "category": "external", "summary": "http://www3.ca.postgresql.org/users-lounge/docs/7.3/postgres/release-7-2-3.html", "url": "http://www3.ca.postgresql.org/users-lounge/docs/7.3/postgres/release-7-2-3.html" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_001.json" } ], "title": "Red Hat Security Advisory: : Updated PostgreSQL packages fix security issues and bugs", "tracking": { "current_release_date": "2024-11-21T22:35:31+00:00", "generator": { "date": "2024-11-21T22:35:31+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2003:001", "initial_release_date": "2003-01-14T22:22:00+00:00", "revision_history": [ { "date": "2003-01-14T22:22:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2003-02-07T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T22:35:31+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Linux 7.3", "product": { "name": "Red Hat Linux 7.3", "product_id": "Red Hat Linux 7.3", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.3" } } }, { "category": "product_name", "name": "Red Hat Linux 8.0", "product": { "name": "Red Hat Linux 8.0", "product_id": "Red Hat Linux 8.0", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:8.0" } } } ], "category": "product_family", "name": "Red Hat Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2002-0972", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616832" } ], "notes": [ { "category": "description", "text": "Buffer overflows in PostgreSQL 7.2 allow attackers to cause a denial of service and possibly execute arbitrary code via long arguments to the functions (1) lpad or (2) rpad.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-0972" }, { "category": "external", "summary": "RHBZ#1616832", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616832" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-0972", "url": "https://www.cve.org/CVERecord?id=CVE-2002-0972" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-0972", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-0972" } ], "release_date": "2002-08-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-14T22:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:001" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2002-1397", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616910" } ], "notes": [ { "category": "description", "text": "Vulnerability in the cash_words() function for PostgreSQL 7.2 and earlier allows local users to cause a denial of service and possibly execute arbitrary code via a large negative argument, possibly triggering an integer signedness error or buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1397" }, { "category": "external", "summary": "RHBZ#1616910", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616910" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1397", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1397" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1397", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1397" } ], "release_date": "2002-08-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-14T22:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:001" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2002-1398", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616911" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the date parser for PostgreSQL before 7.2.2 allows attackers to cause a denial of service and possibly execute arbitrary code via a long date string, aka a vulnerability \"in handling long datetime input.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1398" }, { "category": "external", "summary": "RHBZ#1616911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616911" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1398", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1398" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1398", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1398" } ], "release_date": "2002-08-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-14T22:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:001" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2002-1400", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616912" } ], "notes": [ { "category": "description", "text": "Heap-based buffer overflow in the repeat() function for PostgreSQL before 7.2.2 allows attackers to execute arbitrary code by causing repeat() to generate a large string.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1400" }, { "category": "external", "summary": "RHBZ#1616912", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616912" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1400", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1400" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1400", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1400" } ], "release_date": "2002-08-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-14T22:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:001" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2002-1401", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616913" } ], "notes": [ { "category": "description", "text": "Buffer overflows in (1) circle_poly, (2) path_encode and (3) path_add (also incorrectly identified as path_addr) for PostgreSQL 7.2.3 and earlier allow attackers to cause a denial of service and possibly execute arbitrary code, possibly as a result of an integer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1401" }, { "category": "external", "summary": "RHBZ#1616913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616913" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1401", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1401" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1401", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1401" } ], "release_date": "2002-08-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-14T22:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:001" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2002-1402", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616914" } ], "notes": [ { "category": "description", "text": "Buffer overflows in the (1) TZ and (2) SET TIME ZONE enivronment variables for PostgreSQL 7.2.1 and earlier allow local users to cause a denial of service and possibly execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1402" }, { "category": "external", "summary": "RHBZ#1616914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616914" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1402", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1402" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1402", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1402" } ], "release_date": "2002-08-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-14T22:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:001" } ], "title": "security flaw" } ] }
rhsa-2003_010
Vulnerability from csaf_redhat
Published
2003-01-14 22:40
Modified
2024-11-21 22:35
Summary
Red Hat Security Advisory: : Updated PostgreSQL packages fix buffer overrun vulnerabilities
Notes
Topic
Updated PostgreSQL packages are available for Red Hat Linux 6.2, 7, 7.1,
and 7.2 where we have backported a number of security fixes. A separate
advisory deals with updated PostgreSQL packages for Red Hat Linux 7.3 and 8.0.
Details
PostgreSQL is an advanced Object-Relational database management system
(DBMS). A number of security issues have been found that affect PostgreSQL
versions shipped with Red Hat Linux.
Buffer overflows in PostgreSQL 7.2 allow attackers to cause a denial of
service and possibly execute arbitrary code via long arguments to the lpad
or rpad functions. CAN-2002-0972
Buffer overflow in the cash_words() function for PostgreSQL 7.2 and
earlier allows local users to cause a denial of service and possibly
execute arbitrary code via a malformed argument. CAN-2002-1397
Buffer overflow in the date parser for PostgreSQL before 7.2.2 allows
attackers to cause a denial of service and possibly execute arbitrary
code via a long date string, also known as a vulnerability "in handling
long datetime input." CAN-2002-1398
Heap-based buffer overflow in the repeat() function for PostgreSQL
before 7.2.2 allows attackers to execute arbitrary code by causing
repeat() to generate a large string. CAN-2002-1400
Buffer overflows in circle_poly, path_encode and path_add allow attackers
to cause a denial of service and possibly execute arbitrary code. Note
that these issues have been fixed in our packages and in PostgreSQL CVS,
but are not included in PostgreSQL version 7.2.2 or 7.2.3. CAN-2002-1401
Buffer overflows in the TZ and SET TIME ZONE enivronment variables for
PostgreSQL 7.2.1 and earlier allow local users to cause a denial of service
and possibly execute arbitrary code. CAN-2002-1402
Note that these vulnerabilities are only critical on open or shared systems
because connecting to the database is required before the vulnerabilities
can be exploited.
The PostgreSQL Global Development Team has released versions of PostgreSQL
that fixes these vulnerabilities, and these fixes have been isolated and
backported to the various versions of PostgreSQL that originally shipped
with each Red Hat Linux distribution. All users of PostgreSQL are advised
to install these updated packages.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated PostgreSQL packages are available for Red Hat Linux 6.2, 7, 7.1,\nand 7.2 where we have backported a number of security fixes. A separate\nadvisory deals with updated PostgreSQL packages for Red Hat Linux 7.3 and 8.0.", "title": "Topic" }, { "category": "general", "text": "PostgreSQL is an advanced Object-Relational database management system\n(DBMS). A number of security issues have been found that affect PostgreSQL\nversions shipped with Red Hat Linux. \n\nBuffer overflows in PostgreSQL 7.2 allow attackers to cause a denial of\nservice and possibly execute arbitrary code via long arguments to the lpad\nor rpad functions. CAN-2002-0972\n\nBuffer overflow in the cash_words() function for PostgreSQL 7.2 and\nearlier allows local users to cause a denial of service and possibly\nexecute arbitrary code via a malformed argument. CAN-2002-1397\n\nBuffer overflow in the date parser for PostgreSQL before 7.2.2 allows\nattackers to cause a denial of service and possibly execute arbitrary\ncode via a long date string, also known as a vulnerability \"in handling\nlong datetime input.\" CAN-2002-1398\n\nHeap-based buffer overflow in the repeat() function for PostgreSQL\nbefore 7.2.2 allows attackers to execute arbitrary code by causing\nrepeat() to generate a large string. CAN-2002-1400\n\nBuffer overflows in circle_poly, path_encode and path_add allow attackers\nto cause a denial of service and possibly execute arbitrary code. Note\nthat these issues have been fixed in our packages and in PostgreSQL CVS,\nbut are not included in PostgreSQL version 7.2.2 or 7.2.3. CAN-2002-1401\n\nBuffer overflows in the TZ and SET TIME ZONE enivronment variables for\nPostgreSQL 7.2.1 and earlier allow local users to cause a denial of service\nand possibly execute arbitrary code. CAN-2002-1402\n\nNote that these vulnerabilities are only critical on open or shared systems\nbecause connecting to the database is required before the vulnerabilities\ncan be exploited.\n\nThe PostgreSQL Global Development Team has released versions of PostgreSQL\nthat fixes these vulnerabilities, and these fixes have been isolated and\nbackported to the various versions of PostgreSQL that originally shipped\nwith each Red Hat Linux distribution. All users of PostgreSQL are advised\nto install these updated packages.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2003:010", "url": "https://access.redhat.com/errata/RHSA-2003:010" }, { "category": "external", "summary": "http://lwn.net/Articles/8445/", "url": "http://lwn.net/Articles/8445/" }, { "category": "external", "summary": "http://marc.theaimsgroup.com/?l=postgresql-announce\u0026m=103062536330644", "url": "http://marc.theaimsgroup.com/?l=postgresql-announce\u0026m=103062536330644" }, { "category": "external", "summary": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=102978152712430", "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=102978152712430" }, { "category": "external", "summary": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=102987306029821", "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=102987306029821" }, { "category": "external", "summary": "http://marc.theaimsgroup.com/?l=postgresql-general\u0026m=102995302604086", "url": "http://marc.theaimsgroup.com/?l=postgresql-general\u0026m=102995302604086" }, { "category": "external", "summary": "http://online.securityfocus.com/archive/1/288334", "url": "http://online.securityfocus.com/archive/1/288334" }, { "category": "external", "summary": "http://online.securityfocus.com/archive/1/288305", "url": "http://online.securityfocus.com/archive/1/288305" }, { "category": "external", "summary": "http://online.securityfocus.com/archive/1/288036", "url": "http://online.securityfocus.com/archive/1/288036" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_010.json" } ], "title": "Red Hat Security Advisory: : Updated PostgreSQL packages fix buffer overrun vulnerabilities", "tracking": { "current_release_date": "2024-11-21T22:35:34+00:00", "generator": { "date": "2024-11-21T22:35:34+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2003:010", "initial_release_date": "2003-01-14T22:40:00+00:00", "revision_history": [ { "date": "2003-01-14T22:40:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2003-01-08T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T22:35:34+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Linux 6.2", "product": { "name": "Red Hat Linux 6.2", "product_id": "Red Hat Linux 6.2", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:6.2" } } }, { "category": "product_name", "name": "Red Hat Linux 7.0", "product": { "name": "Red Hat Linux 7.0", "product_id": "Red Hat Linux 7.0", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.0" } } }, { "category": "product_name", "name": "Red Hat Linux 7.1", "product": { "name": "Red Hat Linux 7.1", "product_id": "Red Hat Linux 7.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.1" } } }, { "category": "product_name", "name": "Red Hat Linux 7.2", "product": { "name": "Red Hat Linux 7.2", "product_id": "Red Hat Linux 7.2", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.2" } } } ], "category": "product_family", "name": "Red Hat Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2002-0972", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616832" } ], "notes": [ { "category": "description", "text": "Buffer overflows in PostgreSQL 7.2 allow attackers to cause a denial of service and possibly execute arbitrary code via long arguments to the functions (1) lpad or (2) rpad.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-0972" }, { "category": "external", "summary": "RHBZ#1616832", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616832" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-0972", "url": "https://www.cve.org/CVERecord?id=CVE-2002-0972" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-0972", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-0972" } ], "release_date": "2002-08-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-14T22:40:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nNote that no initdb will be necessary from previous PostgreSQL packages.", "product_ids": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:010" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2002-1397", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616910" } ], "notes": [ { "category": "description", "text": "Vulnerability in the cash_words() function for PostgreSQL 7.2 and earlier allows local users to cause a denial of service and possibly execute arbitrary code via a large negative argument, possibly triggering an integer signedness error or buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1397" }, { "category": "external", "summary": "RHBZ#1616910", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616910" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1397", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1397" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1397", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1397" } ], "release_date": "2002-08-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-14T22:40:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nNote that no initdb will be necessary from previous PostgreSQL packages.", "product_ids": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:010" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2002-1398", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616911" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the date parser for PostgreSQL before 7.2.2 allows attackers to cause a denial of service and possibly execute arbitrary code via a long date string, aka a vulnerability \"in handling long datetime input.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1398" }, { "category": "external", "summary": "RHBZ#1616911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616911" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1398", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1398" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1398", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1398" } ], "release_date": "2002-08-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-14T22:40:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nNote that no initdb will be necessary from previous PostgreSQL packages.", "product_ids": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:010" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2002-1400", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616912" } ], "notes": [ { "category": "description", "text": "Heap-based buffer overflow in the repeat() function for PostgreSQL before 7.2.2 allows attackers to execute arbitrary code by causing repeat() to generate a large string.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1400" }, { "category": "external", "summary": "RHBZ#1616912", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616912" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1400", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1400" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1400", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1400" } ], "release_date": "2002-08-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-14T22:40:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nNote that no initdb will be necessary from previous PostgreSQL packages.", "product_ids": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:010" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2002-1401", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616913" } ], "notes": [ { "category": "description", "text": "Buffer overflows in (1) circle_poly, (2) path_encode and (3) path_add (also incorrectly identified as path_addr) for PostgreSQL 7.2.3 and earlier allow attackers to cause a denial of service and possibly execute arbitrary code, possibly as a result of an integer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1401" }, { "category": "external", "summary": "RHBZ#1616913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616913" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1401", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1401" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1401", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1401" } ], "release_date": "2002-08-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-14T22:40:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nNote that no initdb will be necessary from previous PostgreSQL packages.", "product_ids": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:010" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2002-1402", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616914" } ], "notes": [ { "category": "description", "text": "Buffer overflows in the (1) TZ and (2) SET TIME ZONE enivronment variables for PostgreSQL 7.2.1 and earlier allow local users to cause a denial of service and possibly execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1402" }, { "category": "external", "summary": "RHBZ#1616914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616914" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1402", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1402" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1402", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1402" } ], "release_date": "2002-08-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-14T22:40:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nNote that no initdb will be necessary from previous PostgreSQL packages.", "product_ids": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:010" } ], "title": "security flaw" } ] }
rhsa-2002_301
Vulnerability from csaf_redhat
Published
2003-01-22 18:36
Modified
2024-11-21 22:35
Summary
Red Hat Security Advisory: postgresql security update
Notes
Topic
Updated PostgreSQL packages are available which correct
several minor security vulnerabilities.
[Updated 06 Feb 2003]
Added fixed packages for Advanced Workstation 2.1
Details
PostgreSQL is an advanced Object-Relational database management system
(DBMS). Red Hat Linux Advanced Server 2.1 shipped with PostgreSQL version
7.1.3 which has several security vulnerabilities.
Buffer overflows in PostgreSQL 7.2 allow attackers to cause a denial of
service and possibly execute arbitrary code via long arguments to the lpad
or rpad functions. CAN-2002-0972
Buffer overflow in the cash_words() function for PostgreSQL 7.2 and
earlier allows local users to cause a denial of service and possibly
execute arbitrary code via a malformed argument. CAN-2002-1397
Buffer overflow in the date parser for PostgreSQL before 7.2.2 allows
attackers to cause a denial of service and possibly execute arbitrary
code via a long date string, referred to as a vulnerability "in handling
long datetime input." CAN-2002-1398
Heap-based buffer overflow in the repeat() function for PostgreSQL
before 7.2.2 allows attackers to execute arbitrary code by causing
repeat() to generate a large string. CAN-2002-1400
Buffer overflows in circle_poly, path_encode, and path_add allow attackers
to cause a denial of service and possibly execute arbitrary code. Note
that these issues have been fixed in our packages and in PostgreSQL CVS,
but are not included in PostgreSQL version 7.2.2 or 7.2.3. CAN-2002-1401
Buffer overflows in the TZ and SET TIME ZONE enivronment variables for
PostgreSQL 7.2.1 and earlier allow local users to cause a denial of service
and possibly execute arbitrary code. CAN-2002-1402
Note that these vulnerabilities are only critical on open or shared systems
because connecting to the database is required before the vulnerabilities
can be exploited.
The PostgreSQL Global Development Team has released versions of PostgreSQL
that fix these vulnerabilities, and these fixes have been isolated and
backported into the updated 7.1.3 packages provided with this errata.
All users of Red Hat Linux Advanced Server 2.1 who use PostgreSQL are
advised to install these updated packages.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated PostgreSQL packages are available which correct\nseveral minor security vulnerabilities.\n\n[Updated 06 Feb 2003]\nAdded fixed packages for Advanced Workstation 2.1", "title": "Topic" }, { "category": "general", "text": "PostgreSQL is an advanced Object-Relational database management system\n(DBMS). Red Hat Linux Advanced Server 2.1 shipped with PostgreSQL version\n7.1.3 which has several security vulnerabilities. \n\nBuffer overflows in PostgreSQL 7.2 allow attackers to cause a denial of\nservice and possibly execute arbitrary code via long arguments to the lpad\nor rpad functions. CAN-2002-0972\n\nBuffer overflow in the cash_words() function for PostgreSQL 7.2 and\nearlier allows local users to cause a denial of service and possibly\nexecute arbitrary code via a malformed argument. CAN-2002-1397\n\nBuffer overflow in the date parser for PostgreSQL before 7.2.2 allows\nattackers to cause a denial of service and possibly execute arbitrary\ncode via a long date string, referred to as a vulnerability \"in handling\nlong datetime input.\" CAN-2002-1398\n\nHeap-based buffer overflow in the repeat() function for PostgreSQL\nbefore 7.2.2 allows attackers to execute arbitrary code by causing\nrepeat() to generate a large string. CAN-2002-1400\n\nBuffer overflows in circle_poly, path_encode, and path_add allow attackers\nto cause a denial of service and possibly execute arbitrary code. Note\nthat these issues have been fixed in our packages and in PostgreSQL CVS,\nbut are not included in PostgreSQL version 7.2.2 or 7.2.3. CAN-2002-1401\n\nBuffer overflows in the TZ and SET TIME ZONE enivronment variables for\nPostgreSQL 7.2.1 and earlier allow local users to cause a denial of service\nand possibly execute arbitrary code. CAN-2002-1402\n\nNote that these vulnerabilities are only critical on open or shared systems\nbecause connecting to the database is required before the vulnerabilities\ncan be exploited.\n\nThe PostgreSQL Global Development Team has released versions of PostgreSQL\nthat fix these vulnerabilities, and these fixes have been isolated and\nbackported into the updated 7.1.3 packages provided with this errata.\nAll users of Red Hat Linux Advanced Server 2.1 who use PostgreSQL are\nadvised to install these updated packages.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2002:301", "url": "https://access.redhat.com/errata/RHSA-2002:301" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://lwn.net/Articles/8445/", "url": "http://lwn.net/Articles/8445/" }, { "category": "external", "summary": "http://marc.theaimsgroup.com/?l=postgresql-announce\u0026m=103062536330644", "url": "http://marc.theaimsgroup.com/?l=postgresql-announce\u0026m=103062536330644" }, { "category": "external", "summary": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=102978152712430", "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=102978152712430" }, { "category": "external", "summary": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=102987306029821", "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=102987306029821" }, { "category": "external", "summary": "http://marc.theaimsgroup.com/?l=postgresql-general\u0026m=102995302604086", "url": "http://marc.theaimsgroup.com/?l=postgresql-general\u0026m=102995302604086" }, { "category": "external", "summary": "http://online.securityfocus.com/archive/1/288334", "url": "http://online.securityfocus.com/archive/1/288334" }, { "category": "external", "summary": "http://online.securityfocus.com/archive/1/288305", "url": "http://online.securityfocus.com/archive/1/288305" }, { "category": "external", "summary": "http://online.securityfocus.com/archive/1/288036", "url": "http://online.securityfocus.com/archive/1/288036" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2002_301.json" } ], "title": "Red Hat Security Advisory: postgresql security update", "tracking": { "current_release_date": "2024-11-21T22:35:27+00:00", "generator": { "date": "2024-11-21T22:35:27+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2002:301", "initial_release_date": "2003-01-22T18:36:00+00:00", "revision_history": [ { "date": "2003-01-22T18:36:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2003-02-07T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T22:35:27+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "Red Hat Linux Advanced Workstation 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } } ], "category": "product_family", "name": "Red Hat Advanced Products" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2002-0972", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616832" } ], "notes": [ { "category": "description", "text": "Buffer overflows in PostgreSQL 7.2 allow attackers to cause a denial of service and possibly execute arbitrary code via long arguments to the functions (1) lpad or (2) rpad.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-0972" }, { "category": "external", "summary": "RHBZ#1616832", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616832" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-0972", "url": "https://www.cve.org/CVERecord?id=CVE-2002-0972" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-0972", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-0972" } ], "release_date": "2002-08-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-22T18:36:00+00:00", "details": "This update corrects all of the above-mentioned buffer overruns.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nNote that no initdb will be necessary from previous PostgreSQL 7.1.3 packages.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:301" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2002-1397", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616910" } ], "notes": [ { "category": "description", "text": "Vulnerability in the cash_words() function for PostgreSQL 7.2 and earlier allows local users to cause a denial of service and possibly execute arbitrary code via a large negative argument, possibly triggering an integer signedness error or buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1397" }, { "category": "external", "summary": "RHBZ#1616910", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616910" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1397", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1397" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1397", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1397" } ], "release_date": "2002-08-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-22T18:36:00+00:00", "details": "This update corrects all of the above-mentioned buffer overruns.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nNote that no initdb will be necessary from previous PostgreSQL 7.1.3 packages.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:301" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2002-1398", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616911" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the date parser for PostgreSQL before 7.2.2 allows attackers to cause a denial of service and possibly execute arbitrary code via a long date string, aka a vulnerability \"in handling long datetime input.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1398" }, { "category": "external", "summary": "RHBZ#1616911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616911" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1398", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1398" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1398", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1398" } ], "release_date": "2002-08-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-22T18:36:00+00:00", "details": "This update corrects all of the above-mentioned buffer overruns.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nNote that no initdb will be necessary from previous PostgreSQL 7.1.3 packages.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:301" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2002-1400", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616912" } ], "notes": [ { "category": "description", "text": "Heap-based buffer overflow in the repeat() function for PostgreSQL before 7.2.2 allows attackers to execute arbitrary code by causing repeat() to generate a large string.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1400" }, { "category": "external", "summary": "RHBZ#1616912", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616912" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1400", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1400" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1400", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1400" } ], "release_date": "2002-08-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-22T18:36:00+00:00", "details": "This update corrects all of the above-mentioned buffer overruns.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nNote that no initdb will be necessary from previous PostgreSQL 7.1.3 packages.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:301" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2002-1401", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616913" } ], "notes": [ { "category": "description", "text": "Buffer overflows in (1) circle_poly, (2) path_encode and (3) path_add (also incorrectly identified as path_addr) for PostgreSQL 7.2.3 and earlier allow attackers to cause a denial of service and possibly execute arbitrary code, possibly as a result of an integer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1401" }, { "category": "external", "summary": "RHBZ#1616913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616913" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1401", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1401" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1401", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1401" } ], "release_date": "2002-08-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-22T18:36:00+00:00", "details": "This update corrects all of the above-mentioned buffer overruns.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nNote that no initdb will be necessary from previous PostgreSQL 7.1.3 packages.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:301" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2002-1402", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616914" } ], "notes": [ { "category": "description", "text": "Buffer overflows in the (1) TZ and (2) SET TIME ZONE enivronment variables for PostgreSQL 7.2.1 and earlier allow local users to cause a denial of service and possibly execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1402" }, { "category": "external", "summary": "RHBZ#1616914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616914" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1402", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1402" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1402", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1402" } ], "release_date": "2002-08-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-22T18:36:00+00:00", "details": "This update corrects all of the above-mentioned buffer overruns.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nNote that no initdb will be necessary from previous PostgreSQL 7.1.3 packages.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:301" } ], "title": "security flaw" } ] }
gsd-2002-0972
Vulnerability from gsd
Modified
2023-12-13 01:24
Details
Buffer overflows in PostgreSQL 7.2 allow attackers to cause a denial of service and possibly execute arbitrary code via long arguments to the functions (1) lpad or (2) rpad.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2002-0972", "description": "Buffer overflows in PostgreSQL 7.2 allow attackers to cause a denial of service and possibly execute arbitrary code via long arguments to the functions (1) lpad or (2) rpad.", "id": "GSD-2002-0972", "references": [ "https://www.debian.org/security/2002/dsa-165", "https://access.redhat.com/errata/RHSA-2003:010", "https://access.redhat.com/errata/RHSA-2003:001", "https://access.redhat.com/errata/RHSA-2002:301" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2002-0972" ], "details": "Buffer overflows in PostgreSQL 7.2 allow attackers to cause a denial of service and possibly execute arbitrary code via long arguments to the functions (1) lpad or (2) rpad.", "id": "GSD-2002-0972", "modified": "2023-12-13T01:24:05.906713Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0972", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflows in PostgreSQL 7.2 allow attackers to cause a denial of service and possibly execute arbitrary code via long arguments to the functions (1) lpad or (2) rpad." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "8034", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/8034" }, { "name": "20020820 @(#)Mordred Labs advisory 0x0004: Multiple buffer overflows in PostgreSQL.", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=102987608300785\u0026w=2" }, { "name": "RHSA-2003:001", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-001.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:postgresql:postgresql:7.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:postgresql:postgresql:7.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:postgresql:postgresql:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:postgresql:postgresql:7.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:postgresql:postgresql:6.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:postgresql:postgresql:6.5.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:postgresql:postgresql:7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0972" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Buffer overflows in PostgreSQL 7.2 allow attackers to cause a denial of service and possibly execute arbitrary code via long arguments to the functions (1) lpad or (2) rpad." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2003:001", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2003-001.html" }, { "name": "8034", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/8034" }, { "name": "20020820 @(#)Mordred Labs advisory 0x0004: Multiple buffer overflows in PostgreSQL.", "refsource": "BUGTRAQ", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=102987608300785\u0026w=2" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2016-10-18T02:23Z", "publishedDate": "2002-09-24T04:00Z" } } }
ghsa-m4fw-hwf8-whx3
Vulnerability from github
Published
2022-04-30 18:20
Modified
2022-04-30 18:20
Details
Buffer overflows in PostgreSQL 7.2 allow attackers to cause a denial of service and possibly execute arbitrary code via long arguments to the functions (1) lpad or (2) rpad.
{ "affected": [], "aliases": [ "CVE-2002-0972" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2002-09-24T04:00:00Z", "severity": "MODERATE" }, "details": "Buffer overflows in PostgreSQL 7.2 allow attackers to cause a denial of service and possibly execute arbitrary code via long arguments to the functions (1) lpad or (2) rpad.", "id": "GHSA-m4fw-hwf8-whx3", "modified": "2022-04-30T18:20:17Z", "published": "2022-04-30T18:20:17Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-0972" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=102987608300785\u0026w=2" }, { "type": "WEB", "url": "http://secunia.com/advisories/8034" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2003-001.html" } ], "schema_version": "1.4.0", "severity": [] }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.