CVE-2015-3165
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
28/05/2015
Last modified:
12/04/2025
Description
Double free vulnerability in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 allows remote attackers to cause a denial of service (crash) by closing an SSL session at a time when the authentication timeout will expire during the session shutdown sequence.
Impact
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:mac_os_x_server:5.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:* | 9.0.19 (including) | |
| cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postgresql:postgresql:9.1.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postgresql:postgresql:9.1.6:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html
- http://rhn.redhat.com/errata/RHSA-2015-1194.html
- http://rhn.redhat.com/errata/RHSA-2015-1195.html
- http://rhn.redhat.com/errata/RHSA-2015-1196.html
- http://www.debian.org/security/2015/dsa-3269
- http://www.debian.org/security/2015/dsa-3270
- http://www.postgresql.org/about/news/1587/
- http://www.postgresql.org/docs/9.0/static/release-9-0-20.html
- http://www.postgresql.org/docs/9.1/static/release-9-1-16.html
- http://www.postgresql.org/docs/9.2/static/release-9-2-11.html
- http://www.postgresql.org/docs/9.3/static/release-9-3-7.html
- http://www.postgresql.org/docs/9.4/static/release-9-4-2.html
- http://www.securityfocus.com/bid/74787
- http://www.ubuntu.com/usn/USN-2621-1
- https://security.gentoo.org/glsa/201507-20
- https://support.apple.com/HT205219
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html
- http://rhn.redhat.com/errata/RHSA-2015-1194.html
- http://rhn.redhat.com/errata/RHSA-2015-1195.html
- http://rhn.redhat.com/errata/RHSA-2015-1196.html
- http://www.debian.org/security/2015/dsa-3269
- http://www.debian.org/security/2015/dsa-3270
- http://www.postgresql.org/about/news/1587/
- http://www.postgresql.org/docs/9.0/static/release-9-0-20.html
- http://www.postgresql.org/docs/9.1/static/release-9-1-16.html
- http://www.postgresql.org/docs/9.2/static/release-9-2-11.html
- http://www.postgresql.org/docs/9.3/static/release-9-3-7.html
- http://www.postgresql.org/docs/9.4/static/release-9-4-2.html
- http://www.securityfocus.com/bid/74787
- http://www.ubuntu.com/usn/USN-2621-1
- https://security.gentoo.org/glsa/201507-20
- https://support.apple.com/HT205219



