Input validation error in PostgreSQL - CVE-2002-1397
Published: July 11, 2017 / Updated: June 23, 2025
PostgreSQL
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Vulnerability in the cash_words() function for PostgreSQL 7.2 and earlier allows local users to cause a denial of service and possibly execute arbitrary code via a large negative argument, possibly triggering an integer signedness error or buffer overflow.
How to mitigate CVE-2002-1397
Sources
- http://developer.postgresql.org/cvsweb.cgi/pgsql-server/src/backend/utils/adt/cash.c.diff?r1=1.51&r2=1.52
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000524
- http://marc.info/?l=bugtraq&m=102977465204357&w=2
- http://secunia.com/advisories/8034
- http://www.redhat.com/support/errata/RHSA-2003-001.html
- http://www.securityfocus.com/bid/5497
- https://exchange.xforce.ibmcloud.com/vulnerabilities/9891