#VU41875 Stack-based buffer overflow in PostgreSQL - CVE-2014-0063
Published: March 31, 2014 / Updated: September 24, 2020
PostgreSQL
PostgreSQL Global Development Group
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing vectors related to an incorrect MAXDATELEN constant and datetime values involving (1) intervals, (2) timestamps, or (3) timezones, a different vulnerability than CVE-2014-0065. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html
- http://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html
- http://rhn.redhat.com/errata/RHSA-2014-0211.html
- http://rhn.redhat.com/errata/RHSA-2014-0221.html
- http://rhn.redhat.com/errata/RHSA-2014-0249.html
- http://rhn.redhat.com/errata/RHSA-2014-0469.html
- http://secunia.com/advisories/61307
- http://support.apple.com/kb/HT6448
- http://wiki.postgresql.org/wiki/20140220securityrelease
- http://www.debian.org/security/2014/dsa-2864
- http://www.debian.org/security/2014/dsa-2865
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.postgresql.org/about/news/1506/
- http://www.postgresql.org/support/security/
- http://www.securityfocus.com/bid/65719
- http://www.ubuntu.com/usn/USN-2120-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1065226
- https://github.com/postgres/postgres/commit/4318daecc959886d001a6e79c6ea853e8b1dfb4b
- https://support.apple.com/kb/HT6536