CVE-2014-2669 : Detail

CVE-2014-2669

0.37%V3
Network
2014-03-28
16h00 +00:00
2017-12-15
19h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Multiple integer overflows in contrib/hstore/hstore_io.c in PostgreSQL 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact via vectors related to the (1) hstore_recv, (2) hstore_from_arrays, and (3) hstore_from_array functions in contrib/hstore/hstore_io.c; and the (4) hstoreArrayToPairs function in contrib/hstore/hstore_op.c, which triggers a buffer overflow. NOTE: this issue was SPLIT from CVE-2014-0064 because it has a different set of affected versions.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-189 Category : Numeric Errors
Weaknesses in this category are related to improper calculation or conversion of numbers.

Metrics

Metrics Score Severity CVSS Vector Source
V2 6.5 AV:N/AC:L/Au:S/C:P/I:P/A:P [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Products Mentioned

Configuraton 0

Postgresql>>Postgresql >> Version 9.0

Postgresql>>Postgresql >> Version 9.0.1

Postgresql>>Postgresql >> Version 9.0.2

Postgresql>>Postgresql >> Version 9.0.3

Postgresql>>Postgresql >> Version 9.0.4

Postgresql>>Postgresql >> Version 9.0.5

Postgresql>>Postgresql >> Version 9.0.6

Postgresql>>Postgresql >> Version 9.0.7

Postgresql>>Postgresql >> Version 9.0.8

Postgresql>>Postgresql >> Version 9.0.9

Postgresql>>Postgresql >> Version 9.0.10

Postgresql>>Postgresql >> Version 9.0.11

Postgresql>>Postgresql >> Version 9.0.12

Postgresql>>Postgresql >> Version 9.0.13

Postgresql>>Postgresql >> Version 9.0.14

Postgresql>>Postgresql >> Version 9.0.15

Postgresql>>Postgresql >> Version 9.1

Postgresql>>Postgresql >> Version 9.1.1

Postgresql>>Postgresql >> Version 9.1.2

Postgresql>>Postgresql >> Version 9.1.3

Postgresql>>Postgresql >> Version 9.1.4

Postgresql>>Postgresql >> Version 9.1.5

Postgresql>>Postgresql >> Version 9.1.6

Postgresql>>Postgresql >> Version 9.1.7

Postgresql>>Postgresql >> Version 9.1.8

Postgresql>>Postgresql >> Version 9.1.9

Postgresql>>Postgresql >> Version 9.1.10

Postgresql>>Postgresql >> Version 9.1.11

Postgresql>>Postgresql >> Version 9.2

Postgresql>>Postgresql >> Version 9.2.1

Postgresql>>Postgresql >> Version 9.2.2

Postgresql>>Postgresql >> Version 9.2.3

Postgresql>>Postgresql >> Version 9.2.4

Postgresql>>Postgresql >> Version 9.2.5

Postgresql>>Postgresql >> Version 9.3

Postgresql>>Postgresql >> Version 9.3.1

Postgresql>>Postgresql >> Version 9.3.2

References

http://rhn.redhat.com/errata/RHSA-2014-0221.html
Tags : vendor-advisory, x_refsource_REDHAT
http://rhn.redhat.com/errata/RHSA-2014-0469.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www.debian.org/security/2014/dsa-2864
Tags : vendor-advisory, x_refsource_DEBIAN
http://www.debian.org/security/2014/dsa-2865
Tags : vendor-advisory, x_refsource_DEBIAN