Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2007-4769

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-09 Jan, 2008 | 21:00
Updated At-07 Aug, 2024 | 15:08
Rejected At-
Credits

The regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows remote authenticated users to cause a denial of service (backend crash) via an out-of-bounds backref number.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:09 Jan, 2008 | 21:00
Updated At:07 Aug, 2024 | 15:08
Rejected At:
▼CVE Numbering Authority (CNA)

The regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows remote authenticated users to cause a denial of service (backend crash) via an out-of-bounds backref number.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.mandriva.com/security/advisories?name=MDVSA-2008:004
vendor-advisory
x_refsource_MANDRIVA
http://www.debian.org/security/2008/dsa-1460
vendor-advisory
x_refsource_DEBIAN
http://www.securityfocus.com/bid/27163
vdb-entry
x_refsource_BID
https://issues.rpath.com/browse/RPL-1768
x_refsource_CONFIRM
http://www.redhat.com/support/errata/RHSA-2008-0038.html
vendor-advisory
x_refsource_REDHAT
http://secunia.com/advisories/28454
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/485864/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://secunia.com/advisories/28359
third-party-advisory
x_refsource_SECUNIA
http://www.postgresql.org/about/news.905
x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00000.html
vendor-advisory
x_refsource_SUSE
http://www.vupen.com/english/advisories/2008/0061
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/28679
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/0109
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/28376
third-party-advisory
x_refsource_SECUNIA
http://sourceforge.net/tracker/index.php?func=detail&aid=1810264&group_id=10894&atid=110894
x_refsource_CONFIRM
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103197-1
vendor-advisory
x_refsource_SUNALERT
http://secunia.com/advisories/28437
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/28455
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/28477
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/29638
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/28479
third-party-advisory
x_refsource_SECUNIA
http://sourceforge.net/project/shownotes.php?release_id=565440&group_id=10894
x_refsource_CONFIRM
http://www.debian.org/security/2008/dsa-1463
vendor-advisory
x_refsource_DEBIAN
http://www.redhat.com/support/errata/RHSA-2008-0040.html
vendor-advisory
x_refsource_REDHAT
http://www.securityfocus.com/archive/1/486407/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://secunia.com/advisories/28464
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/28698
third-party-advisory
x_refsource_SECUNIA
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01420154
vendor-advisory
x_refsource_HP
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200559-1
vendor-advisory
x_refsource_SUNALERT
https://usn.ubuntu.com/568-1/
vendor-advisory
x_refsource_UBUNTU
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00469.html
vendor-advisory
x_refsource_FEDORA
http://secunia.com/advisories/28438
third-party-advisory
x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/39499
vdb-entry
x_refsource_XF
http://securitytracker.com/id?1019157
vdb-entry
x_refsource_SECTRACK
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00397.html
vendor-advisory
x_refsource_FEDORA
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01420154
vendor-advisory
x_refsource_HP
http://security.gentoo.org/glsa/glsa-200801-15.xml
vendor-advisory
x_refsource_GENTOO
http://www.vupen.com/english/advisories/2008/1071/references
vdb-entry
x_refsource_VUPEN
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9804
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2008:004
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://www.debian.org/security/2008/dsa-1460
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://www.securityfocus.com/bid/27163
Resource:
vdb-entry
x_refsource_BID
Hyperlink: https://issues.rpath.com/browse/RPL-1768
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0038.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://secunia.com/advisories/28454
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/archive/1/485864/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://secunia.com/advisories/28359
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.postgresql.org/about/news.905
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00000.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://www.vupen.com/english/advisories/2008/0061
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/28679
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/0109
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/28376
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://sourceforge.net/tracker/index.php?func=detail&aid=1810264&group_id=10894&atid=110894
Resource:
x_refsource_CONFIRM
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-103197-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: http://secunia.com/advisories/28437
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/28455
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/28477
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/29638
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/28479
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://sourceforge.net/project/shownotes.php?release_id=565440&group_id=10894
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.debian.org/security/2008/dsa-1463
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0040.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.securityfocus.com/archive/1/486407/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://secunia.com/advisories/28464
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/28698
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01420154
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-66-200559-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: https://usn.ubuntu.com/568-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00469.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://secunia.com/advisories/28438
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/39499
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://securitytracker.com/id?1019157
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00397.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01420154
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://security.gentoo.org/glsa/glsa-200801-15.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://www.vupen.com/english/advisories/2008/1071/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9804
Resource:
vdb-entry
signature
x_refsource_OVAL
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.mandriva.com/security/advisories?name=MDVSA-2008:004
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://www.debian.org/security/2008/dsa-1460
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://www.securityfocus.com/bid/27163
vdb-entry
x_refsource_BID
x_transferred
https://issues.rpath.com/browse/RPL-1768
x_refsource_CONFIRM
x_transferred
http://www.redhat.com/support/errata/RHSA-2008-0038.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://secunia.com/advisories/28454
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/archive/1/485864/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://secunia.com/advisories/28359
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.postgresql.org/about/news.905
x_refsource_CONFIRM
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00000.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://www.vupen.com/english/advisories/2008/0061
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/28679
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/0109
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/28376
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://sourceforge.net/tracker/index.php?func=detail&aid=1810264&group_id=10894&atid=110894
x_refsource_CONFIRM
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103197-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
http://secunia.com/advisories/28437
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/28455
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/28477
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/29638
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/28479
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://sourceforge.net/project/shownotes.php?release_id=565440&group_id=10894
x_refsource_CONFIRM
x_transferred
http://www.debian.org/security/2008/dsa-1463
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://www.redhat.com/support/errata/RHSA-2008-0040.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.securityfocus.com/archive/1/486407/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://secunia.com/advisories/28464
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/28698
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01420154
vendor-advisory
x_refsource_HP
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200559-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
https://usn.ubuntu.com/568-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00469.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://secunia.com/advisories/28438
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/39499
vdb-entry
x_refsource_XF
x_transferred
http://securitytracker.com/id?1019157
vdb-entry
x_refsource_SECTRACK
x_transferred
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00397.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01420154
vendor-advisory
x_refsource_HP
x_transferred
http://security.gentoo.org/glsa/glsa-200801-15.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://www.vupen.com/english/advisories/2008/1071/references
vdb-entry
x_refsource_VUPEN
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9804
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2008:004
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://www.debian.org/security/2008/dsa-1460
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://www.securityfocus.com/bid/27163
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://issues.rpath.com/browse/RPL-1768
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0038.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://secunia.com/advisories/28454
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/485864/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://secunia.com/advisories/28359
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.postgresql.org/about/news.905
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00000.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/0061
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/28679
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/0109
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/28376
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://sourceforge.net/tracker/index.php?func=detail&aid=1810264&group_id=10894&atid=110894
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-103197-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: http://secunia.com/advisories/28437
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/28455
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/28477
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/29638
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/28479
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://sourceforge.net/project/shownotes.php?release_id=565440&group_id=10894
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.debian.org/security/2008/dsa-1463
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0040.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/486407/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://secunia.com/advisories/28464
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/28698
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01420154
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-66-200559-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: https://usn.ubuntu.com/568-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00469.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://secunia.com/advisories/28438
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/39499
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://securitytracker.com/id?1019157
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00397.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01420154
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-200801-15.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/1071/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9804
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:09 Jan, 2008 | 21:46
Updated At:15 Oct, 2018 | 21:37

The regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows remote authenticated users to cause a denial of service (backend crash) via an out-of-bounds backref number.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.06.8MEDIUM
AV:N/AC:L/Au:S/C:N/I:N/A:C
Type: Primary
Version: 2.0
Base score: 6.8
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:S/C:N/I:N/A:C
CPE Matches

The PostgreSQL Global Development Group
postgresql
>>postgresql>>7.3
cpe:2.3:a:postgresql:postgresql:7.3:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>7.3.1
cpe:2.3:a:postgresql:postgresql:7.3.1:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>7.3.2
cpe:2.3:a:postgresql:postgresql:7.3.2:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>7.3.3
cpe:2.3:a:postgresql:postgresql:7.3.3:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>7.3.4
cpe:2.3:a:postgresql:postgresql:7.3.4:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>7.3.6
cpe:2.3:a:postgresql:postgresql:7.3.6:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>7.3.8
cpe:2.3:a:postgresql:postgresql:7.3.8:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>7.3.9
cpe:2.3:a:postgresql:postgresql:7.3.9:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>7.3.10
cpe:2.3:a:postgresql:postgresql:7.3.10:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>7.3.11
cpe:2.3:a:postgresql:postgresql:7.3.11:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>7.3.12
cpe:2.3:a:postgresql:postgresql:7.3.12:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>7.3.13
cpe:2.3:a:postgresql:postgresql:7.3.13:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>7.3.14
cpe:2.3:a:postgresql:postgresql:7.3.14:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>7.3.15
cpe:2.3:a:postgresql:postgresql:7.3.15:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>7.3.16
cpe:2.3:a:postgresql:postgresql:7.3.16:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>7.3.19
cpe:2.3:a:postgresql:postgresql:7.3.19:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>7.4
cpe:2.3:a:postgresql:postgresql:7.4:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>7.4.1
cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>7.4.2
cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>7.4.3
cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>7.4.4
cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>7.4.5
cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>7.4.6
cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>7.4.7
cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>7.4.8
cpe:2.3:a:postgresql:postgresql:7.4.8:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>7.4.9
cpe:2.3:a:postgresql:postgresql:7.4.9:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>7.4.10
cpe:2.3:a:postgresql:postgresql:7.4.10:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>7.4.11
cpe:2.3:a:postgresql:postgresql:7.4.11:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>7.4.12
cpe:2.3:a:postgresql:postgresql:7.4.12:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>7.4.13
cpe:2.3:a:postgresql:postgresql:7.4.13:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>7.4.14
cpe:2.3:a:postgresql:postgresql:7.4.14:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>7.4.16
cpe:2.3:a:postgresql:postgresql:7.4.16:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>7.4.17
cpe:2.3:a:postgresql:postgresql:7.4.17:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>8.0
cpe:2.3:a:postgresql:postgresql:8.0:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>8.0.1
cpe:2.3:a:postgresql:postgresql:8.0.1:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>8.0.2
cpe:2.3:a:postgresql:postgresql:8.0.2:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>8.0.3
cpe:2.3:a:postgresql:postgresql:8.0.3:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>8.0.4
cpe:2.3:a:postgresql:postgresql:8.0.4:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>8.0.5
cpe:2.3:a:postgresql:postgresql:8.0.5:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>8.0.7
cpe:2.3:a:postgresql:postgresql:8.0.7:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>8.0.8
cpe:2.3:a:postgresql:postgresql:8.0.8:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>8.0.9
cpe:2.3:a:postgresql:postgresql:8.0.9:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>8.0.11
cpe:2.3:a:postgresql:postgresql:8.0.11:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>8.0.13
cpe:2.3:a:postgresql:postgresql:8.0.13:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>8.0.317
cpe:2.3:a:postgresql:postgresql:8.0.317:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>8.1.1
cpe:2.3:a:postgresql:postgresql:8.1.1:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>8.1.3
cpe:2.3:a:postgresql:postgresql:8.1.3:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>8.1.4
cpe:2.3:a:postgresql:postgresql:8.1.4:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>8.1.5
cpe:2.3:a:postgresql:postgresql:8.1.5:*:*:*:*:*:*:*
The PostgreSQL Global Development Group
postgresql
>>postgresql>>8.1.7
cpe:2.3:a:postgresql:postgresql:8.1.7:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-189Primarynvd@nist.gov
CWE ID: CWE-189
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01420154cve@mitre.org
N/A
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00000.htmlcve@mitre.org
N/A
http://secunia.com/advisories/28359cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/28376cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/28437cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/28438cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/28454cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/28455cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/28464cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/28477cve@mitre.org
N/A
http://secunia.com/advisories/28479cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/28679cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/28698cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/29638cve@mitre.org
Vendor Advisory
http://security.gentoo.org/glsa/glsa-200801-15.xmlcve@mitre.org
N/A
http://securitytracker.com/id?1019157cve@mitre.org
N/A
http://sourceforge.net/project/shownotes.php?release_id=565440&group_id=10894cve@mitre.org
N/A
http://sourceforge.net/tracker/index.php?func=detail&aid=1810264&group_id=10894&atid=110894cve@mitre.org
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103197-1cve@mitre.org
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200559-1cve@mitre.org
N/A
http://www.debian.org/security/2008/dsa-1460cve@mitre.org
N/A
http://www.debian.org/security/2008/dsa-1463cve@mitre.org
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2008:004cve@mitre.org
N/A
http://www.postgresql.org/about/news.905cve@mitre.org
N/A
http://www.redhat.com/support/errata/RHSA-2008-0038.htmlcve@mitre.org
N/A
http://www.redhat.com/support/errata/RHSA-2008-0040.htmlcve@mitre.org
N/A
http://www.securityfocus.com/archive/1/485864/100/0/threadedcve@mitre.org
N/A
http://www.securityfocus.com/archive/1/486407/100/0/threadedcve@mitre.org
N/A
http://www.securityfocus.com/bid/27163cve@mitre.org
Patch
http://www.vupen.com/english/advisories/2008/0061cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2008/0109cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2008/1071/referencescve@mitre.org
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/39499cve@mitre.org
N/A
https://issues.rpath.com/browse/RPL-1768cve@mitre.org
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9804cve@mitre.org
N/A
https://usn.ubuntu.com/568-1/cve@mitre.org
N/A
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00397.htmlcve@mitre.org
N/A
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00469.htmlcve@mitre.org
N/A
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01420154
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00000.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/28359
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/28376
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/28437
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/28438
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/28454
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/28455
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/28464
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/28477
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/28479
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/28679
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/28698
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/29638
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://security.gentoo.org/glsa/glsa-200801-15.xml
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://securitytracker.com/id?1019157
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://sourceforge.net/project/shownotes.php?release_id=565440&group_id=10894
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://sourceforge.net/tracker/index.php?func=detail&aid=1810264&group_id=10894&atid=110894
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-103197-1
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-66-200559-1
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.debian.org/security/2008/dsa-1460
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.debian.org/security/2008/dsa-1463
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2008:004
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.postgresql.org/about/news.905
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0038.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0040.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/485864/100/0/threaded
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/486407/100/0/threaded
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/27163
Source: cve@mitre.org
Resource:
Patch
Hyperlink: http://www.vupen.com/english/advisories/2008/0061
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/0109
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/1071/references
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/39499
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://issues.rpath.com/browse/RPL-1768
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9804
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://usn.ubuntu.com/568-1/
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00397.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00469.html
Source: cve@mitre.org
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

3Records found

CVE-2007-6067
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-1.01% / 76.15%
||
7 Day CHG~0.00%
Published-09 Jan, 2008 | 21:00
Updated-07 Aug, 2024 | 15:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Algorithmic complexity vulnerability in the regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows remote authenticated users to cause a denial of service (memory consumption) via a crafted "complex" regular expression with doubly-nested states.

Action-Not Available
Vendor-tcl_tkn/aThe PostgreSQL Global Development Group
Product-tcl_tkpostgresqln/a
CWE ID-CWE-189
Not Available
CVE-2013-0255
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-6.8||MEDIUM
EPSS-3.09% / 86.25%
||
7 Day CHG~0.00%
Published-13 Feb, 2013 | 01:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

PostgreSQL 9.2.x before 9.2.3, 9.1.x before 9.1.8, 9.0.x before 9.0.12, 8.4.x before 8.4.16, and 8.3.x before 8.3.23 does not properly declare the enum_recv function in backend/utils/adt/enum.c, which causes it to be invoked with incorrect arguments and allows remote authenticated users to cause a denial of service (server crash) or read sensitive process memory via a crafted SQL command, which triggers an array index error and an out-of-bounds read.

Action-Not Available
Vendor-n/aThe PostgreSQL Global Development Group
Product-postgresqln/a
CWE ID-CWE-20
Improper Input Validation
CVE-2008-2361
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-6.8||MEDIUM
EPSS-1.48% / 80.21%
||
7 Day CHG~0.00%
Published-16 Jun, 2008 | 19:00
Updated-07 Aug, 2024 | 08:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in the ProcRenderCreateCursor function in the Render extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to cause a denial of service (daemon crash) via unspecified request fields that are used to calculate a glyph buffer size, which triggers a dereference of unmapped memory.

Action-Not Available
Vendor-n/aX.Org Foundation
Product-x11n/a
CWE ID-CWE-189
Not Available
Details not found