PostgreSQL.Database.Password.Change.Stack.Buffer.Overflow
Description
This indicates an attack attempt to exploit a Buffer Overflow vulnerability in PostgreSQL PostgreSQL.
A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to the target system. Successful exploitation results in the stack-based buffer overflow condition, which may lead to the application crash or arbitrary code execution under context of Administrator.
Affected Products
PostgreSQL PostgreSQL 10.x prior to 10.9
PostgreSQL PostgreSQL 11.x prior to 11.4
PostgreSQL PostgreSQL 9.4.x prior to 9.4.23
PostgreSQL PostgreSQL 9.5.x prior to 9.5.18
PostgreSQL PostgreSQL 9.6.x prior to 9.6.14
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://www.postgresql.org/about/news/1949/
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2019-10-24 | 14.710 | Default_action:pass:drop |
2019-08-20 | 14.672 | Sig Added |
2019-07-16 | 14.649 |