-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathCVE-2015-0242.json
100 lines (100 loc) · 4.13 KB
/
CVE-2015-0242.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
{
"CVE-ID": "CVE-2015-0242",
"NVD": {
"Descriptions": "Stack-based buffer overflow in the *printf function implementations in PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1, when running on a Windows system, allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a floating point number with a large precision, as demonstrated by using the to_char function.",
"Cvss2_BaseScore": 6.5,
"Cvss3_BaseScore": 8.8,
"Cvss2_VectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"Cvss3_VectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CPEs": [
{
"URI": "cpe:/o:debian:debian_linux:8.0",
"FormattedString": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"VersionStartExcluding": "",
"VersionStartIncluding": "",
"VersionEndExcluding": "",
"VersionEndIncluding": ""
},
{
"URI": "cpe:/o:debian:debian_linux:7.0",
"FormattedString": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"VersionStartExcluding": "",
"VersionStartIncluding": "",
"VersionEndExcluding": "",
"VersionEndIncluding": ""
},
{
"URI": "cpe:/a:postgresql:postgresql",
"FormattedString": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
"VersionStartExcluding": "",
"VersionStartIncluding": "",
"VersionEndExcluding": "9.0.19",
"VersionEndIncluding": ""
},
{
"URI": "cpe:/a:postgresql:postgresql",
"FormattedString": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
"VersionStartExcluding": "",
"VersionStartIncluding": "9.1.0",
"VersionEndExcluding": "9.1.15",
"VersionEndIncluding": ""
},
{
"URI": "cpe:/a:postgresql:postgresql",
"FormattedString": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
"VersionStartExcluding": "",
"VersionStartIncluding": "9.2.0",
"VersionEndExcluding": "9.2.10",
"VersionEndIncluding": ""
},
{
"URI": "cpe:/a:postgresql:postgresql",
"FormattedString": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
"VersionStartExcluding": "",
"VersionStartIncluding": "9.3.0",
"VersionEndExcluding": "9.3.6",
"VersionEndIncluding": ""
},
{
"URI": "cpe:/a:postgresql:postgresql",
"FormattedString": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
"VersionStartExcluding": "",
"VersionStartIncluding": "9.4.0",
"VersionEndExcluding": "9.4.1",
"VersionEndIncluding": ""
}
]
},
"Official": {
"9.0.19": {
"source": [
"https://www.postgresql.org/support/security/9.0/",
"https://www.postgresql.org/docs/release/9.0.19/"
]
},
"9.1.15": {
"source": [
"https://www.postgresql.org/support/security/9.1/",
"https://www.postgresql.org/docs/release/9.1.15/"
]
},
"9.2.10": {
"source": [
"https://www.postgresql.org/support/security/9.2/",
"https://www.postgresql.org/docs/release/9.2.10/"
]
},
"9.3.6": {
"source": [
"https://www.postgresql.org/support/security/9.3/",
"https://www.postgresql.org/docs/release/9.3.6/"
]
},
"9.4.1": {
"source": [
"https://www.postgresql.org/support/security/9.4/",
"https://www.postgresql.org/docs/release/9.4.1/"
]
}
}
}