CVE-2016-5423
Published: 11 August 2016
PostgreSQL before 9.1.23, 9.2.x before 9.2.18, 9.3.x before 9.3.14, 9.4.x before 9.4.9, and 9.5.x before 9.5.4 allow remote authenticated users to cause a denial of service (NULL pointer dereference and server crash), obtain sensitive memory information, or possibly execute arbitrary code via (1) a CASE expression within the test value subexpression of another CASE or (2) inlining of an SQL function that implements the equality operator used for a CASE expression involving values of different types.
Priority
Status
Package | Release | Status |
---|---|---|
postgresql-9.5 Launchpad, Ubuntu, Debian |
xenial |
Released
(9.5.4-0ubuntu0.16.04)
|
zesty |
Does not exist
|
|
upstream |
Released
(9.5.4)
|
|
precise |
Does not exist
|
|
trusty |
Does not exist
|
|
yakkety |
Not vulnerable
(9.5.4-1)
|
|
Patches: upstream: https://git.postgresql.org/gitweb/?p=postgresql.git;a=commitdiff;h=f0c7b789ab12fbc8248b671c7882dd96ac932ef4 |
||
postgresql-9.3 Launchpad, Ubuntu, Debian |
upstream |
Released
(9.3.14)
|
precise |
Does not exist
|
|
trusty |
Released
(9.3.14-0ubuntu0.14.04)
|
|
xenial |
Does not exist
|
|
yakkety |
Does not exist
|
|
zesty |
Does not exist
|
|
postgresql-9.1 Launchpad, Ubuntu, Debian |
upstream |
Released
(9.1.23)
|
precise |
Released
(9.1.23-0ubuntu0.12.04)
|
|
trusty |
Released
(9.1.23-0ubuntu0.14.04)
|
|
xenial |
Does not exist
|
|
yakkety |
Does not exist
|
|
zesty |
Does not exist
|
|
postgresql-8.4 Launchpad, Ubuntu, Debian |
upstream |
Needs triage
|
precise |
Ignored
(end of life)
|
|
trusty |
Does not exist
|
|
xenial |
Does not exist
|
|
yakkety |
Does not exist
|
|
zesty |
Does not exist
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.3 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | Low |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H |