cve-2010-4015
Vulnerability from cvelistv5
Published
2011-02-02 00:00
Modified
2024-08-07 03:26
Severity ?
Summary
Buffer overflow in the gettoken function in contrib/intarray/_int_bool.c in the intarray array module in PostgreSQL 9.0.x before 9.0.3, 8.4.x before 8.4.7, 8.3.x before 8.3.14, and 8.2.x before 8.2.20 allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via integers with a large number of digits to unspecified functions.
References
product-security@apple.comhttp://git.postgresql.org/gitweb?p=postgresql.git%3Ba=commitdiff%3Bh=7ccb6dc2d3e266a551827bb99179708580f72431
product-security@apple.comhttp://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
product-security@apple.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-February/053817.html
product-security@apple.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-February/053888.html
product-security@apple.comhttp://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
product-security@apple.comhttp://marc.info/?l=bugtraq&m=134124585221119&w=2
product-security@apple.comhttp://marc.info/?l=bugtraq&m=134124585221119&w=2
product-security@apple.comhttp://osvdb.org/70740
product-security@apple.comhttp://secunia.com/advisories/43144Vendor Advisory
product-security@apple.comhttp://secunia.com/advisories/43154
product-security@apple.comhttp://secunia.com/advisories/43155
product-security@apple.comhttp://secunia.com/advisories/43187
product-security@apple.comhttp://secunia.com/advisories/43188
product-security@apple.comhttp://secunia.com/advisories/43240
product-security@apple.comhttp://www.debian.org/security/2011/dsa-2157
product-security@apple.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2011:021
product-security@apple.comhttp://www.postgresql.org/about/news.1289
product-security@apple.comhttp://www.postgresql.org/support/security
product-security@apple.comhttp://www.redhat.com/support/errata/RHSA-2011-0197.html
product-security@apple.comhttp://www.redhat.com/support/errata/RHSA-2011-0198.html
product-security@apple.comhttp://www.securityfocus.com/bid/46084
product-security@apple.comhttp://www.ubuntu.com/usn/USN-1058-1
product-security@apple.comhttp://www.vupen.com/english/advisories/2011/0262Vendor Advisory
product-security@apple.comhttp://www.vupen.com/english/advisories/2011/0278
product-security@apple.comhttp://www.vupen.com/english/advisories/2011/0283
product-security@apple.comhttp://www.vupen.com/english/advisories/2011/0287
product-security@apple.comhttp://www.vupen.com/english/advisories/2011/0299
product-security@apple.comhttp://www.vupen.com/english/advisories/2011/0303
product-security@apple.comhttp://www.vupen.com/english/advisories/2011/0349
product-security@apple.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/65060
af854a3a-2127-422b-91ae-364da2661108http://git.postgresql.org/gitweb?p=postgresql.git%3Ba=commitdiff%3Bh=7ccb6dc2d3e266a551827bb99179708580f72431
af854a3a-2127-422b-91ae-364da2661108http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053817.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053888.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=134124585221119&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=134124585221119&w=2
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/70740
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/43144Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/43154
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/43155
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/43187
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/43188
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/43240
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2011/dsa-2157
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2011:021
af854a3a-2127-422b-91ae-364da2661108http://www.postgresql.org/about/news.1289
af854a3a-2127-422b-91ae-364da2661108http://www.postgresql.org/support/security
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2011-0197.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2011-0198.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/46084
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1058-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0262Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0278
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0283
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0287
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0299
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0303
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0349
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/65060
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:26:12.220Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2011-0283",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0283"
          },
          {
            "name": "70740",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/70740"
          },
          {
            "name": "43144",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43144"
          },
          {
            "name": "HPSBMU02781",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=134124585221119\u0026w=2"
          },
          {
            "name": "RHSA-2011:0198",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-0198.html"
          },
          {
            "name": "FEDORA-2011-0990",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053817.html"
          },
          {
            "name": "RHSA-2011:0197",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-0197.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.postgresql.org/about/news.1289"
          },
          {
            "name": "ADV-2011-0349",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0349"
          },
          {
            "name": "43187",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43187"
          },
          {
            "name": "SUSE-SR:2011:005",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
          },
          {
            "name": "USN-1058-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1058-1"
          },
          {
            "name": "MDVSA-2011:021",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:021"
          },
          {
            "name": "ADV-2011-0262",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0262"
          },
          {
            "name": "ADV-2011-0303",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0303"
          },
          {
            "name": "DSA-2157",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2157"
          },
          {
            "name": "ADV-2011-0287",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0287"
          },
          {
            "name": "43155",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43155"
          },
          {
            "name": "43154",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43154"
          },
          {
            "name": "43188",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43188"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.postgresql.org/support/security"
          },
          {
            "name": "46084",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/46084"
          },
          {
            "name": "postgresql-gettoken-buffer-overflow(65060)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65060"
          },
          {
            "name": "43240",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43240"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.postgresql.org/gitweb?p=postgresql.git%3Ba=commitdiff%3Bh=7ccb6dc2d3e266a551827bb99179708580f72431"
          },
          {
            "name": "FEDORA-2011-0963",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053888.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
          },
          {
            "name": "ADV-2011-0278",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0278"
          },
          {
            "name": "ADV-2011-0299",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0299"
          },
          {
            "name": "SSRT100617",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=134124585221119\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-02-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the gettoken function in contrib/intarray/_int_bool.c in the intarray array module in PostgreSQL 9.0.x before 9.0.3, 8.4.x before 8.4.7, 8.3.x before 8.3.14, and 8.2.x before 8.2.20 allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via integers with a large number of digits to unspecified functions."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
        "shortName": "apple"
      },
      "references": [
        {
          "name": "ADV-2011-0283",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0283"
        },
        {
          "name": "70740",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/70740"
        },
        {
          "name": "43144",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43144"
        },
        {
          "name": "HPSBMU02781",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=134124585221119\u0026w=2"
        },
        {
          "name": "RHSA-2011:0198",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-0198.html"
        },
        {
          "name": "FEDORA-2011-0990",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053817.html"
        },
        {
          "name": "RHSA-2011:0197",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-0197.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.postgresql.org/about/news.1289"
        },
        {
          "name": "ADV-2011-0349",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0349"
        },
        {
          "name": "43187",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43187"
        },
        {
          "name": "SUSE-SR:2011:005",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
        },
        {
          "name": "USN-1058-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1058-1"
        },
        {
          "name": "MDVSA-2011:021",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:021"
        },
        {
          "name": "ADV-2011-0262",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0262"
        },
        {
          "name": "ADV-2011-0303",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0303"
        },
        {
          "name": "DSA-2157",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2157"
        },
        {
          "name": "ADV-2011-0287",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0287"
        },
        {
          "name": "43155",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43155"
        },
        {
          "name": "43154",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43154"
        },
        {
          "name": "43188",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43188"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.postgresql.org/support/security"
        },
        {
          "name": "46084",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/46084"
        },
        {
          "name": "postgresql-gettoken-buffer-overflow(65060)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65060"
        },
        {
          "name": "43240",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43240"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.postgresql.org/gitweb?p=postgresql.git%3Ba=commitdiff%3Bh=7ccb6dc2d3e266a551827bb99179708580f72431"
        },
        {
          "name": "FEDORA-2011-0963",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053888.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
        },
        {
          "name": "ADV-2011-0278",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0278"
        },
        {
          "name": "ADV-2011-0299",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0299"
        },
        {
          "name": "SSRT100617",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=134124585221119\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "product-security@apple.com",
          "ID": "CVE-2010-4015",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the gettoken function in contrib/intarray/_int_bool.c in the intarray array module in PostgreSQL 9.0.x before 9.0.3, 8.4.x before 8.4.7, 8.3.x before 8.3.14, and 8.2.x before 8.2.20 allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via integers with a large number of digits to unspecified functions."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2011-0283",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0283"
            },
            {
              "name": "70740",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/70740"
            },
            {
              "name": "43144",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43144"
            },
            {
              "name": "HPSBMU02781",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=134124585221119\u0026w=2"
            },
            {
              "name": "RHSA-2011:0198",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2011-0198.html"
            },
            {
              "name": "FEDORA-2011-0990",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053817.html"
            },
            {
              "name": "RHSA-2011:0197",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2011-0197.html"
            },
            {
              "name": "http://www.postgresql.org/about/news.1289",
              "refsource": "CONFIRM",
              "url": "http://www.postgresql.org/about/news.1289"
            },
            {
              "name": "ADV-2011-0349",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0349"
            },
            {
              "name": "43187",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43187"
            },
            {
              "name": "SUSE-SR:2011:005",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
            },
            {
              "name": "USN-1058-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1058-1"
            },
            {
              "name": "MDVSA-2011:021",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:021"
            },
            {
              "name": "ADV-2011-0262",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0262"
            },
            {
              "name": "ADV-2011-0303",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0303"
            },
            {
              "name": "DSA-2157",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2011/dsa-2157"
            },
            {
              "name": "ADV-2011-0287",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0287"
            },
            {
              "name": "43155",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43155"
            },
            {
              "name": "43154",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43154"
            },
            {
              "name": "43188",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43188"
            },
            {
              "name": "http://www.postgresql.org/support/security",
              "refsource": "CONFIRM",
              "url": "http://www.postgresql.org/support/security"
            },
            {
              "name": "46084",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/46084"
            },
            {
              "name": "postgresql-gettoken-buffer-overflow(65060)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65060"
            },
            {
              "name": "43240",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43240"
            },
            {
              "name": "http://git.postgresql.org/gitweb?p=postgresql.git;a=commitdiff;h=7ccb6dc2d3e266a551827bb99179708580f72431",
              "refsource": "CONFIRM",
              "url": "http://git.postgresql.org/gitweb?p=postgresql.git;a=commitdiff;h=7ccb6dc2d3e266a551827bb99179708580f72431"
            },
            {
              "name": "FEDORA-2011-0963",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053888.html"
            },
            {
              "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705",
              "refsource": "CONFIRM",
              "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
            },
            {
              "name": "ADV-2011-0278",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0278"
            },
            {
              "name": "ADV-2011-0299",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0299"
            },
            {
              "name": "SSRT100617",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=134124585221119\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
    "assignerShortName": "apple",
    "cveId": "CVE-2010-4015",
    "datePublished": "2011-02-02T00:00:00",
    "dateReserved": "2010-10-20T00:00:00",
    "dateUpdated": "2024-08-07T03:26:12.220Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2A705DF-3654-427F-8B11-62DB0B6C9813\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"05AD5D33-86F4-4BFF-BA84-02AA1347BEEB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02FDCF30-D0F7-48AA-9633-9CC060495F47\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"788975F6-B3F1-4C21-B963-6BA59F14B71C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6713D96-338B-4467-9F05-3153997F62E2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"01EB1A77-92AD-47FB-8290-D05C9B6C19C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.3.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"74857259-30C7-422D-A24D-BE1E33F09466\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.3.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD80066B-787E-496B-88FD-F0AE291468C5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.3.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"88C9F0AB-A125-4DCD-A02B-E04D4D95FB5D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.3.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8FF13F89-F4C3-43EC-A36A-2F9283E923B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.3.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2631F09-73DD-4A28-8082-3939D89DDBE0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.3.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"82DDE9E7-EBF9-452B-8380-F9E87CF30ACA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.3.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4BAE68CF-198D-4F01-92F3-4DED7E50ACA6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.3.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF798CBC-C8BB-4F88-A927-B385A0DD8F19\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2DD4DE67-9E3C-4F79-8AAB-344C1C46C618\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:9.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CCB718D2-97AA-4D61-AA4B-2216EEF55F67\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:9.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"605C06BF-54A0-40F8-A01E-8641B4A83035\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F30CA60-0A82-45CD-8044-CE245393593D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C991F71-1E27-47A6-97DC-424FC3EF6011\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5740C7AA-1772-41D8-9851-3E3669CD8521\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"970338CD-A680-4DD0-BD27-459B0DDA4002\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.4.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A99C579D-44C0-40A4-A4EB-CBCF40D0C2FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.4.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3E9E57FA-5EAE-4698-992D-146C6310E0B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.4.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C66CDEC1-FB2E-49B7-A8BE-38E43C8ED652\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7213327F-6909-43A7-952E-11600C28D4E3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"10EF0EA6-C8B6-40A7-A3AE-8639CA94D5C5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D9F645F3-9767-4FD8-94EB-1096DF24E6C3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C342A823-EF6F-4557-9F9E-D8893EA4C2BA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B85A443F-0802-412F-9AEE-3525311C93D4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.2.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"06253BA8-7F1E-4C79-9B2E-197307A627F0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.2.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A213AB8-A5FE-4062-B895-2FC4B19F60A4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.2.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A3F083E-59A8-41B1-826F-2CA39BD425C9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.2.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE49E2D5-8EAC-49C7-B704-E626FBE7EC35\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.2.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5059B2F-B588-463E-8E96-BC9DA129C12E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.2.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C919AF97-9713-44F8-B742-89C438DB0B48\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.2.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"400BBC62-5D03-465B-A864-9CD479B963F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.2.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC8C96F7-7F85-4E47-A05F-15E3C70AF583\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.2.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C236CF1-72C0-4C3D-AE04-B67E3F18EEC8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.2.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ECC98D47-8B3C-4DE6-8C45-F5B92266027F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.2.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C170C441-619A-48DB-9332-05FA4E62C342\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.2.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"053A2531-CFAA-466D-811C-A6154826D596\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.2.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84A3D04C-2739-474C-B659-CBCFA574198B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.2.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D38CF1E-A944-4F7A-BECE-F8DF2589C873\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postgresql:postgresql:8.2.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16502427-0BEE-4BCA-8CD8-83B5703ECDA4\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Buffer overflow in the gettoken function in contrib/intarray/_int_bool.c in the intarray array module in PostgreSQL 9.0.x before 9.0.3, 8.4.x before 8.4.7, 8.3.x before 8.3.14, and 8.2.x before 8.2.20 allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via integers with a large number of digits to unspecified functions.\"}, {\"lang\": \"es\", \"value\": \"Desbordamiento de b\\u00fafer en la funci\\u00f3n gettoken en contrib/intarray/_int_bool.c en el m\\u00f3dulo de matriz intArray de PostgreSQL v9.0.x anterior a v9.0.3, v8.4.x anterior a v8.4.7, v8.3.x anterior a v8.3.14, y v8.2.x anterior a v8.2.20 permite a usuarios autenticados remotamente causar una denegaci\\u00f3n de servicio (ca\\u00edda) y posiblemente ejecucar c\\u00f3digo de su elecci\\u00f3n a trav\\u00e9s de enteros con un gran n\\u00famero de d\\u00edgitos en funciones no especificadas\"}]",
      "id": "CVE-2010-4015",
      "lastModified": "2024-11-21T01:20:04.370",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:P/I:P/A:P\", \"baseScore\": 6.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2011-02-02T01:00:03.877",
      "references": "[{\"url\": \"http://git.postgresql.org/gitweb?p=postgresql.git%3Ba=commitdiff%3Bh=7ccb6dc2d3e266a551827bb99179708580f72431\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053817.html\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053888.html\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=134124585221119\u0026w=2\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=134124585221119\u0026w=2\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://osvdb.org/70740\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://secunia.com/advisories/43144\", \"source\": \"product-security@apple.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/43154\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://secunia.com/advisories/43155\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://secunia.com/advisories/43187\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://secunia.com/advisories/43188\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://secunia.com/advisories/43240\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://www.debian.org/security/2011/dsa-2157\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2011:021\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://www.postgresql.org/about/news.1289\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://www.postgresql.org/support/security\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-0197.html\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-0198.html\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://www.securityfocus.com/bid/46084\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://www.ubuntu.com/usn/USN-1058-1\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2011/0262\", \"source\": \"product-security@apple.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2011/0278\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2011/0283\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2011/0287\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2011/0299\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2011/0303\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2011/0349\", \"source\": \"product-security@apple.com\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/65060\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://git.postgresql.org/gitweb?p=postgresql.git%3Ba=commitdiff%3Bh=7ccb6dc2d3e266a551827bb99179708580f72431\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053817.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053888.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=134124585221119\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=134124585221119\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://osvdb.org/70740\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/43144\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/43154\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/43155\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/43187\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/43188\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/43240\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2011/dsa-2157\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2011:021\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.postgresql.org/about/news.1289\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.postgresql.org/support/security\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-0197.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-0198.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/46084\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ubuntu.com/usn/USN-1058-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2011/0262\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2011/0278\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2011/0283\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2011/0287\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2011/0299\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2011/0303\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2011/0349\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/65060\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "product-security@apple.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-189\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2010-4015\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2011-02-02T01:00:03.877\",\"lastModified\":\"2024-11-21T01:20:04.370\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Buffer overflow in the gettoken function in contrib/intarray/_int_bool.c in the intarray array module in PostgreSQL 9.0.x before 9.0.3, 8.4.x before 8.4.7, 8.3.x before 8.3.14, and 8.2.x before 8.2.20 allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via integers with a large number of digits to unspecified functions.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de b\u00fafer en la funci\u00f3n gettoken en contrib/intarray/_int_bool.c en el m\u00f3dulo de matriz intArray de PostgreSQL v9.0.x anterior a v9.0.3, v8.4.x anterior a v8.4.7, v8.3.x anterior a v8.3.14, y v8.2.x anterior a v8.2.20 permite a usuarios autenticados remotamente causar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecucar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de enteros con un gran n\u00famero de d\u00edgitos en funciones no especificadas\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:P/A:P\",\"baseScore\":6.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-189\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2A705DF-3654-427F-8B11-62DB0B6C9813\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05AD5D33-86F4-4BFF-BA84-02AA1347BEEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02FDCF30-D0F7-48AA-9633-9CC060495F47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"788975F6-B3F1-4C21-B963-6BA59F14B71C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6713D96-338B-4467-9F05-3153997F62E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01EB1A77-92AD-47FB-8290-D05C9B6C19C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74857259-30C7-422D-A24D-BE1E33F09466\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD80066B-787E-496B-88FD-F0AE291468C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88C9F0AB-A125-4DCD-A02B-E04D4D95FB5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FF13F89-F4C3-43EC-A36A-2F9283E923B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2631F09-73DD-4A28-8082-3939D89DDBE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82DDE9E7-EBF9-452B-8380-F9E87CF30ACA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.3.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BAE68CF-198D-4F01-92F3-4DED7E50ACA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.3.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF798CBC-C8BB-4F88-A927-B385A0DD8F19\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DD4DE67-9E3C-4F79-8AAB-344C1C46C618\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:9.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCB718D2-97AA-4D61-AA4B-2216EEF55F67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:9.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"605C06BF-54A0-40F8-A01E-8641B4A83035\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F30CA60-0A82-45CD-8044-CE245393593D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C991F71-1E27-47A6-97DC-424FC3EF6011\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5740C7AA-1772-41D8-9851-3E3669CD8521\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"970338CD-A680-4DD0-BD27-459B0DDA4002\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A99C579D-44C0-40A4-A4EB-CBCF40D0C2FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E9E57FA-5EAE-4698-992D-146C6310E0B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C66CDEC1-FB2E-49B7-A8BE-38E43C8ED652\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7213327F-6909-43A7-952E-11600C28D4E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10EF0EA6-C8B6-40A7-A3AE-8639CA94D5C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9F645F3-9767-4FD8-94EB-1096DF24E6C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C342A823-EF6F-4557-9F9E-D8893EA4C2BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B85A443F-0802-412F-9AEE-3525311C93D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06253BA8-7F1E-4C79-9B2E-197307A627F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A213AB8-A5FE-4062-B895-2FC4B19F60A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A3F083E-59A8-41B1-826F-2CA39BD425C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE49E2D5-8EAC-49C7-B704-E626FBE7EC35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5059B2F-B588-463E-8E96-BC9DA129C12E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C919AF97-9713-44F8-B742-89C438DB0B48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"400BBC62-5D03-465B-A864-9CD479B963F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC8C96F7-7F85-4E47-A05F-15E3C70AF583\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.2.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C236CF1-72C0-4C3D-AE04-B67E3F18EEC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.2.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECC98D47-8B3C-4DE6-8C45-F5B92266027F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.2.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C170C441-619A-48DB-9332-05FA4E62C342\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.2.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"053A2531-CFAA-466D-811C-A6154826D596\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.2.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84A3D04C-2739-474C-B659-CBCFA574198B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.2.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D38CF1E-A944-4F7A-BECE-F8DF2589C873\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postgresql:postgresql:8.2.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16502427-0BEE-4BCA-8CD8-83B5703ECDA4\"}]}]}],\"references\":[{\"url\":\"http://git.postgresql.org/gitweb?p=postgresql.git%3Ba=commitdiff%3Bh=7ccb6dc2d3e266a551827bb99179708580f72431\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053817.html\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053888.html\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=134124585221119\u0026w=2\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=134124585221119\u0026w=2\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://osvdb.org/70740\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://secunia.com/advisories/43144\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43154\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://secunia.com/advisories/43155\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://secunia.com/advisories/43187\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://secunia.com/advisories/43188\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://secunia.com/advisories/43240\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://www.debian.org/security/2011/dsa-2157\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:021\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://www.postgresql.org/about/news.1289\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://www.postgresql.org/support/security\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0197.html\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0198.html\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://www.securityfocus.com/bid/46084\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1058-1\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0262\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0278\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0283\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0287\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0299\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0303\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0349\",\"source\":\"product-security@apple.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/65060\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://git.postgresql.org/gitweb?p=postgresql.git%3Ba=commitdiff%3Bh=7ccb6dc2d3e266a551827bb99179708580f72431\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053817.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053888.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=134124585221119\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=134124585221119\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://osvdb.org/70740\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/43144\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43154\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/43155\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/43187\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/43188\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/43240\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2011/dsa-2157\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:021\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.postgresql.org/about/news.1289\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.postgresql.org/support/security\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0197.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0198.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/46084\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1058-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0262\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0278\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0283\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0287\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0299\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0303\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0349\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/65060\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.