CVE-2014-0063
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
31/03/2014
Last modified:
12/04/2025
Description
Multiple stack-based buffer overflows in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via vectors related to an incorrect MAXDATELEN constant and datetime values involving (1) intervals, (2) timestamps, or (3) timezones, a different vulnerability than CVE-2014-0065.
Impact
Base Score 2.0
6.50
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:* | 8.4.19 (including) | |
cpe:2.3:a:postgresql:postgresql:8.4.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:postgresql:postgresql:8.4.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:postgresql:postgresql:8.4.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:postgresql:postgresql:8.4.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:postgresql:postgresql:8.4.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:postgresql:postgresql:8.4.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:postgresql:postgresql:8.4.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:postgresql:postgresql:8.4.8:*:*:*:*:*:*:* | ||
cpe:2.3:a:postgresql:postgresql:8.4.9:*:*:*:*:*:*:* | ||
cpe:2.3:a:postgresql:postgresql:8.4.10:*:*:*:*:*:*:* | ||
cpe:2.3:a:postgresql:postgresql:8.4.11:*:*:*:*:*:*:* | ||
cpe:2.3:a:postgresql:postgresql:8.4.12:*:*:*:*:*:*:* | ||
cpe:2.3:a:postgresql:postgresql:8.4.13:*:*:*:*:*:*:* | ||
cpe:2.3:a:postgresql:postgresql:8.4.14:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html
- http://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html
- http://rhn.redhat.com/errata/RHSA-2014-0211.html
- http://rhn.redhat.com/errata/RHSA-2014-0221.html
- http://rhn.redhat.com/errata/RHSA-2014-0249.html
- http://rhn.redhat.com/errata/RHSA-2014-0469.html
- http://secunia.com/advisories/61307
- http://support.apple.com/kb/HT6448
- http://wiki.postgresql.org/wiki/20140220securityrelease
- http://www.debian.org/security/2014/dsa-2864
- http://www.debian.org/security/2014/dsa-2865
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.postgresql.org/about/news/1506/
- http://www.postgresql.org/support/security/
- http://www.securityfocus.com/bid/65719
- http://www.ubuntu.com/usn/USN-2120-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1065226
- https://github.com/postgres/postgres/commit/4318daecc959886d001a6e79c6ea853e8b1dfb4b
- https://support.apple.com/kb/HT6536
- http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html
- http://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html
- http://rhn.redhat.com/errata/RHSA-2014-0211.html
- http://rhn.redhat.com/errata/RHSA-2014-0221.html
- http://rhn.redhat.com/errata/RHSA-2014-0249.html
- http://rhn.redhat.com/errata/RHSA-2014-0469.html
- http://secunia.com/advisories/61307
- http://support.apple.com/kb/HT6448
- http://wiki.postgresql.org/wiki/20140220securityrelease
- http://www.debian.org/security/2014/dsa-2864
- http://www.debian.org/security/2014/dsa-2865
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.postgresql.org/about/news/1506/
- http://www.postgresql.org/support/security/
- http://www.securityfocus.com/bid/65719
- http://www.ubuntu.com/usn/USN-2120-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1065226
- https://github.com/postgres/postgres/commit/4318daecc959886d001a6e79c6ea853e8b1dfb4b
- https://support.apple.com/kb/HT6536