Описание
Buffer overflows in (1) circle_poly, (2) path_encode and (3) path_add (also incorrectly identified as path_addr) for PostgreSQL 7.2.3 and earlier allow attackers to cause a denial of service and possibly execute arbitrary code, possibly as a result of an integer overflow.
Buffer overflows in (1) circle_poly, (2) path_encode and (3) path_add (also incorrectly identified as path_addr) for PostgreSQL 7.2.3 and earlier allow attackers to cause a denial of service and possibly execute arbitrary code, possibly as a result of an integer overflow.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2002-1401
- http://archives.postgresql.org/pgsql-hackers/2002-08/msg02047.php
- http://archives.postgresql.org/pgsql-hackers/2002-08/msg02081.php
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000524
- http://secunia.com/advisories/8034
- http://www.debian.org/security/2002/dsa-165
- http://www.redhat.com/support/errata/RHSA-2003-001.html
Связанные уязвимости
Buffer overflows in (1) circle_poly, (2) path_encode and (3) path_add (also incorrectly identified as path_addr) for PostgreSQL 7.2.3 and earlier allow attackers to cause a denial of service and possibly execute arbitrary code, possibly as a result of an integer overflow.
Buffer overflows in (1) circle_poly, (2) path_encode and (3) path_add (also incorrectly identified as path_addr) for PostgreSQL 7.2.3 and earlier allow attackers to cause a denial of service and possibly execute arbitrary code, possibly as a result of an integer overflow.
Buffer overflows in (1) circle_poly, (2) path_encode and (3) path_add ...
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации