fkie_cve-2007-0556
Vulnerability from fkie_nvd
Published
2007-02-06 01:28
Modified
2025-04-09 00:30
Severity ?
Summary
The query planner in PostgreSQL before 8.0.11, 8.1 before 8.1.7, and 8.2 before 8.2.2 does not verify that a table is compatible with a "previously made query plan," which allows remote authenticated users to cause a denial of service (server crash) and possibly access database content via an "ALTER COLUMN TYPE" SQL statement, which can be leveraged to read arbitrary memory from the server.
References
cve@mitre.orghttp://fedoranews.org/cms/node/2554
cve@mitre.orghttp://lists.rpath.com/pipermail/security-announce/2007-February/000141.html
cve@mitre.orghttp://osvdb.org/33302
cve@mitre.orghttp://secunia.com/advisories/24028
cve@mitre.orghttp://secunia.com/advisories/24033Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/24042
cve@mitre.orghttp://secunia.com/advisories/24050
cve@mitre.orghttp://secunia.com/advisories/24057
cve@mitre.orghttp://secunia.com/advisories/24151
cve@mitre.orghttp://secunia.com/advisories/24315
cve@mitre.orghttp://secunia.com/advisories/24513
cve@mitre.orghttp://secunia.com/advisories/24577
cve@mitre.orghttp://secunia.com/advisories/25220
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200703-15.xml
cve@mitre.orghttp://securitytracker.com/id?1017597
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-26-102825-1
cve@mitre.orghttp://support.avaya.com/elmodocs2/security/ASA-2007-117.htm
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2007:037
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2007_10_sr.html
cve@mitre.orghttp://www.postgresql.org/support/security
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2007-0067.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2007-0068.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/459280/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/459448/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/22387
cve@mitre.orghttp://www.trustix.org/errata/2007/0007
cve@mitre.orghttp://www.ubuntu.com/usn/usn-417-2
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/0478
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/0774
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/32191
cve@mitre.orghttps://issues.rpath.com/browse/RPL-1025
cve@mitre.orghttps://issues.rpath.com/browse/RPL-830
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11353
cve@mitre.orghttps://usn.ubuntu.com/417-1/
af854a3a-2127-422b-91ae-364da2661108http://fedoranews.org/cms/node/2554
af854a3a-2127-422b-91ae-364da2661108http://lists.rpath.com/pipermail/security-announce/2007-February/000141.html
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/33302
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24028
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24033Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24042
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24050
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24057
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24151
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24315
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24513
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24577
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25220
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200703-15.xml
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1017597
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-102825-1
af854a3a-2127-422b-91ae-364da2661108http://support.avaya.com/elmodocs2/security/ASA-2007-117.htm
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:037
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_10_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.postgresql.org/support/security
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0067.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0068.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/459280/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/459448/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/22387
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2007/0007
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-417-2
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/0478
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/0774
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/32191
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-1025
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-830
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11353
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/417-1/
Impacted products
Vendor Product Version
postgresql postgresql 1.0
postgresql postgresql 1.01
postgresql postgresql 1.02
postgresql postgresql 1.09
postgresql postgresql 6.0
postgresql postgresql 6.1
postgresql postgresql 6.1.1
postgresql postgresql 6.2
postgresql postgresql 6.2.1
postgresql postgresql 6.3
postgresql postgresql 6.3.1
postgresql postgresql 6.3.2
postgresql postgresql 6.4
postgresql postgresql 6.4.1
postgresql postgresql 6.4.2
postgresql postgresql 6.5
postgresql postgresql 6.5.1
postgresql postgresql 6.5.2
postgresql postgresql 6.5.3
postgresql postgresql 7.0
postgresql postgresql 7.0.1
postgresql postgresql 7.0.2
postgresql postgresql 7.0.3
postgresql postgresql 7.1
postgresql postgresql 7.1.1
postgresql postgresql 7.1.2
postgresql postgresql 7.1.3
postgresql postgresql 7.2
postgresql postgresql 7.2.1
postgresql postgresql 7.2.2
postgresql postgresql 7.2.3
postgresql postgresql 7.2.4
postgresql postgresql 7.2.5
postgresql postgresql 7.2.6
postgresql postgresql 7.2.7
postgresql postgresql 7.2.8
postgresql postgresql 7.3
postgresql postgresql 7.3.1
postgresql postgresql 7.3.2
postgresql postgresql 7.3.3
postgresql postgresql 7.3.4
postgresql postgresql 7.3.5
postgresql postgresql 7.3.6
postgresql postgresql 7.3.7
postgresql postgresql 7.3.8
postgresql postgresql 7.3.9
postgresql postgresql 7.3.10
postgresql postgresql 7.3.11
postgresql postgresql 7.3.12
postgresql postgresql 7.3.13
postgresql postgresql 7.3.14
postgresql postgresql 7.3.15
postgresql postgresql 7.3.16
postgresql postgresql 7.3.17
postgresql postgresql 7.3.18
postgresql postgresql 7.4
postgresql postgresql 7.4.1
postgresql postgresql 7.4.2
postgresql postgresql 7.4.3
postgresql postgresql 7.4.4
postgresql postgresql 7.4.5
postgresql postgresql 7.4.6
postgresql postgresql 7.4.7
postgresql postgresql 7.4.8
postgresql postgresql 7.4.9
postgresql postgresql 7.4.10
postgresql postgresql 7.4.11
postgresql postgresql 7.4.12
postgresql postgresql 7.4.13
postgresql postgresql 7.4.14
postgresql postgresql 7.4.15
postgresql postgresql 7.4.16
postgresql postgresql 8.0
postgresql postgresql 8.0.1
postgresql postgresql 8.0.2
postgresql postgresql 8.0.3
postgresql postgresql 8.0.4
postgresql postgresql 8.0.5
postgresql postgresql 8.0.6
postgresql postgresql 8.0.7
postgresql postgresql 8.0.8
postgresql postgresql 8.0.9
postgresql postgresql 8.0.10
postgresql postgresql 8.1
postgresql postgresql 8.1.1
postgresql postgresql 8.1.2
postgresql postgresql 8.1.3
postgresql postgresql 8.1.4
postgresql postgresql 8.1.5
postgresql postgresql 8.1.6
postgresql postgresql 8.2
postgresql postgresql 8.2.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE21FA09-BC22-4BDB-8889-9E8EEAF4D9FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:1.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4874FFE-7398-45D4-9119-9350203ED404",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:1.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "51F6CCF4-DC3A-4573-9DE6-929173BCDB0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:1.09:*:*:*:*:*:*:*",
              "matchCriteriaId": "73DA4203-E7CC-448B-A593-3E5EF5A981A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "09459E09-963A-47F3-A080-5B31B50998D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D907CA1A-3EED-42E7-8313-AC92BD25523E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:6.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "479757E6-3B99-4789-809B-8824634B1310",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FEEBCFC-6BD6-4101-BAAA-6B0F7CD95D28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:6.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "55D60331-C30F-4AB9-94F3-76915CCFCC0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F57AEDD8-19DF-4663-9114-FAC47C9E7EFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:6.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "693E9301-9C61-48C3-AEA8-D83277930EBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:6.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF7D1F6F-044C-478D-991D-D70281FD7C87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7BD9AB7-9C01-40E6-870A-4F63AD992331",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:6.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E5726B9-AA83-49D5-AE1C-A0FE842082F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:6.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4809B8CC-B29F-446B-93DF-6A696C1B3DFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6279C825-CF45-4812-958F-33937E5A5A16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:6.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "491B90C5-5CB8-4928-979B-73B5CE79E612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:6.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "721A5228-ABB3-4B91-BD1E-833213A0CDB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:6.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EB98484-1234-4BA2-ACB0-28F4BE684D92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CB2F41F-3A48-4253-8EC3-FB10D97177FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7566158D-2258-466F-8CCF-7EA632C22349",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E42F6221-1AFF-4A4B-A08A-6E976D1EBBE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E7C5056-E280-4BD3-9924-2345B0B82776",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0D16C66-3688-4CF1-8788-F7D7766F04F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F520EC9F-7B20-4108-B3DC-ABF4947A2D6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "78D324E1-A723-4ECC-A58F-660A5125FD05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F8CB95-DCEE-49C9-8985-E39E8E0498BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "95E0614E-0911-43EE-9F3D-2CF87E0F1851",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFF09CFB-F7CE-4659-BB20-83231539F765",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFE8C2A3-7575-41C6-896C-C367E6D35015",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "88ED8E8C-9044-4E77-923A-D5C6C02A1081",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "037FF208-82A1-4448-88FE-FACB922FE1E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "458F558C-7550-48B8-8318-A0D5FAF9ABF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF1A6E7C-B1DC-45CC-90B4-AFD6F669AA94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "23B710BA-91FF-47B9-BB56-4711CD50D50F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "492192F0-50CD-496D-847E-9D5FA389D4F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4064A96D-84D5-4257-9981-1139CD4CD08C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C98290E4-2919-4492-BD14-BB24BA85C729",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B56E9F72-6CBF-4784-89CD-435A030AC0B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DEF0FE5-EFCF-448E-B6BD-95FDDD4E17FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "03B480F0-8FFC-4463-ADC6-95906751811C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BF44286-0DBF-4CCA-8FFB-993976C18CDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "629881D2-2A6D-4461-8C35-6EE575B63E6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5C91580-6428-4234-92DF-6A96108FCF7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5A19EB5-A1AF-4293-854D-347CD21065DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B18ED293-B408-435F-9D1F-2365A2E51022",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7106B29-76F3-43FD-BF57-4693D5B55076",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "16B804CD-AE47-4B46-9B37-7F46D4C9A332",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23E89A3-551D-42E2-90EC-59A9DAB4F854",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FC46594-100B-459F-BCB7-1FA9D0719D76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.3.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "AECD278B-55A7-4BCC-8AF1-004F02A96BD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.3.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "95DB94EF-32AE-4DD9-A9A4-4F7D4BE5F1AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.3.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE0ED225-91C8-4FA6-9E33-A1D1AA99AA9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.3.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "5952970A-E97F-487C-A22C-258F57E18749",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.3.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "823FA621-A72C-4927-AA9E-3359FFAFA031",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBE2567C-BF48-4255-9E56-590A6F9DD932",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C8DDD98-9A2D-402D-9172-F3C4C4C97FEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "20C8302B-631A-4DF7-839B-C6F3CC39E000",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB318EB9-1B49-452A-92CF-89D9BA990AB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5913A53B-7B72-4CBD-ADAE-318333EB8B7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "815E58C0-327D-4F14-B496-05FC8179627E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EF2D056-5120-4F98-8343-4EC31F962CFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "516E0E86-3D8A-43F9-9DD5-865F5C889FC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A7A9D3C-4BB6-4974-BF96-6E6728196F4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "486EDE1B-37E0-4DDF-BFC9-C8C8945D5E2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7FC7F18-B227-4C46-9A33-FB34DDE456CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCDB903F-0C89-4E65-857E-553CF9C192E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6BF8B1E-68F7-4F27-AD1F-FA02B256BDAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD0DEB63-CA70-44C1-9491-E0790D1A8E21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA8E73E5-BA41-4FA2-8457-803A97FB00C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C9B64CA-778F-405D-A441-34599246A3F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "4975D8ED-7DCB-430F-98E1-DB165D6DA7E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "94222D76-82BE-4FFB-BE4B-5DBAF3080D4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "91D1232E-4D0A-4BDC-99F6-25AEE014E9AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "105E9F52-D17E-4A0B-9C46-FD32A930B1E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DE2055D-AAA4-4A6A-918F-349A9749AF09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C12409B2-161B-4F78-B7AD-3CF69DDCC574",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD2F1DA4-6625-469D-988B-5457B68851A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "870F4348-6001-4C2F-A547-61964074E7C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2E26D52-D95A-4547-BE6E-4F142F54A624",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AAB2D1D-BE61-4D7C-B305-58B4F4126620",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A5F8D8B-34C5-4EBC-BB20-4D11191238B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E260F1F9-0068-4289-A8E8-C30220C2E1F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AF590F2-899F-42E1-8A57-6F514C94CE4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEEC35A2-B17C-46EC-8697-9E03568339BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "00562C18-DD81-4B09-AF93-739AF8757A12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B52D093-7867-4FE8-B055-D8190103A1E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF1A06EE-26BD-4CDA-AEB9-01124FC37E37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF855730-C61C-4FDC-96CB-57775A903421",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D93296E1-AEA2-443E-B9AA-D70535DDD093",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7213327F-6909-43A7-952E-11600C28D4E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "10EF0EA6-C8B6-40A7-A3AE-8639CA94D5C5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The query planner in PostgreSQL before 8.0.11, 8.1 before 8.1.7, and 8.2 before 8.2.2 does not verify that a table is compatible with a \"previously made query plan,\" which allows remote authenticated users to cause a denial of service (server crash) and possibly access database content via an \"ALTER COLUMN TYPE\" SQL statement, which can be leveraged to read arbitrary memory from the server."
    },
    {
      "lang": "es",
      "value": "El planificador de peticiones en PostgreSQL anterior a 8.0.11, 8.1 anterior a 8.1.7, y 8.2 anterior a 8.2.2 no verifica que una tabla sea compatible con un \"plan de peticiones realizado previamente\", lo cual permite a usuarios autenticados remotamente provocar una denegaci\u00f3n de servicio (ca\u00edda del servidor) y posiblemente acceder a contenido de la base de datos mediante una sentencia SQL \"ALTER COLUMN TYPE\", lo cual puede ser aprovechado para leer memoria de su elecci\u00f3n del servidor."
    }
  ],
  "id": "CVE-2007-0556",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.6,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:H/Au:S/C:C/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 9.2,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-02-06T01:28:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://fedoranews.org/cms/node/2554"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.rpath.com/pipermail/security-announce/2007-February/000141.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/33302"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/24028"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24033"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/24042"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/24050"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/24057"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/24151"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/24315"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/24513"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/24577"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25220"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200703-15.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1017597"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102825-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-117.htm"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:037"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2007_10_sr.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.postgresql.org/support/security"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0067.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0068.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/459280/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/459448/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/22387"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.trustix.org/errata/2007/0007"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/usn-417-2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/0478"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/0774"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32191"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://issues.rpath.com/browse/RPL-1025"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://issues.rpath.com/browse/RPL-830"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11353"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://usn.ubuntu.com/417-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://fedoranews.org/cms/node/2554"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.rpath.com/pipermail/security-announce/2007-February/000141.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/33302"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24028"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24033"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24042"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24050"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24057"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24151"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24315"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24513"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24577"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25220"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200703-15.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1017597"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102825-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-117.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:037"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2007_10_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.postgresql.org/support/security"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0067.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0068.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/459280/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/459448/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/22387"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.trustix.org/errata/2007/0007"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-417-2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/0478"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/0774"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32191"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-1025"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-830"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11353"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/417-1/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…