{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2007-0555", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "PostgreSQL 7.3 before 7.3.13, 7.4 before 7.4.16, 8.0 before 8.0.11, 8.1 before 8.1.7, and 8.2 before 8.2.2 allows attackers to disable certain checks for the data types of SQL function arguments, which allows remote authenticated users to cause a denial of service (server crash) and possibly access database content." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "name" : "20070206 rPSA-2007-0025-1 postgresql postgresql-server", "refsource" : "BUGTRAQ", "url" : "http://www.securityfocus.com/archive/1/459280/100/0/threaded" }, { "name" : "20070208 rPSA-2007-0025-2 postgresql postgresql-server", "refsource" : "BUGTRAQ", "url" : "http://www.securityfocus.com/archive/1/459448/100/0/threaded" }, { "name" : "[security-announce] 20070206 rPSA-2007-0025-1 postgresql postgresql-server", "refsource" : "MLIST", "url" : "http://lists.rpath.com/pipermail/security-announce/2007-February/000141.html" }, { "name" : "http://www.postgresql.org/support/security", "refsource" : "CONFIRM", "url" : "http://www.postgresql.org/support/security" }, { "name" : "https://issues.rpath.com/browse/RPL-830", "refsource" : "CONFIRM", "url" : "https://issues.rpath.com/browse/RPL-830" }, { "name" : "https://issues.rpath.com/browse/RPL-1025", "refsource" : "CONFIRM", "url" : "https://issues.rpath.com/browse/RPL-1025" }, { "name" : "http://support.avaya.com/elmodocs2/security/ASA-2007-117.htm", "refsource" : "CONFIRM", "url" : "http://support.avaya.com/elmodocs2/security/ASA-2007-117.htm" }, { "name" : "DSA-1261", "refsource" : "DEBIAN", "url" : "http://www.debian.org/security/2007/dsa-1261" }, { "name" : "FEDORA-2007-198", "refsource" : "FEDORA", "url" : "http://fedoranews.org/cms/node/2554" }, { "name" : "GLSA-200703-15", "refsource" : "GENTOO", "url" : "http://security.gentoo.org/glsa/glsa-200703-15.xml" }, { "name" : "MDKSA-2007:037", "refsource" : "MANDRIVA", "url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:037" }, { "name" : "RHSA-2007:0064", "refsource" : "REDHAT", "url" : "http://www.redhat.com/support/errata/RHSA-2007-0064.html" }, { "name" : "RHSA-2007:0067", "refsource" : "REDHAT", "url" : "http://www.redhat.com/support/errata/RHSA-2007-0067.html" }, { "name" : "RHSA-2007:0068", "refsource" : "REDHAT", "url" : "http://www.redhat.com/support/errata/RHSA-2007-0068.html" }, { "name" : "20070201-01-P", "refsource" : "SGI", "url" : "ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc" }, { "name" : "102825", "refsource" : "SUNALERT", "url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102825-1" }, { "name" : "SUSE-SR:2007:010", "refsource" : "SUSE", "url" : "http://www.novell.com/linux/security/advisories/2007_10_sr.html" }, { "name" : "2007-0007", "refsource" : "TRUSTIX", "url" : "http://www.trustix.org/errata/2007/0007" }, { "name" : "USN-417-1", "refsource" : "UBUNTU", "url" : "https://usn.ubuntu.com/417-1/" }, { "name" : "USN-417-2", "refsource" : "UBUNTU", "url" : "http://www.ubuntu.com/usn/usn-417-2" }, { "name" : "22387", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/22387" }, { "name" : "oval:org.mitre.oval:def:9739", "refsource" : "OVAL", "url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9739" }, { "name" : "ADV-2007-0478", "refsource" : "VUPEN", "url" : "http://www.vupen.com/english/advisories/2007/0478" }, { "name" : "ADV-2007-0774", "refsource" : "VUPEN", "url" : "http://www.vupen.com/english/advisories/2007/0774" }, { "name" : "33087", "refsource" : "OSVDB", "url" : "http://osvdb.org/33087" }, { "name" : "1017597", "refsource" : "SECTRACK", "url" : "http://securitytracker.com/id?1017597" }, { "name" : "24033", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/24033" }, { "name" : "24028", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/24028" }, { "name" : "24057", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/24057" }, { "name" : "24050", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/24050" }, { "name" : "24042", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/24042" }, { "name" : "24094", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/24094" }, { "name" : "24151", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/24151" }, { "name" : "24158", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/24158" }, { "name" : "24315", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/24315" }, { "name" : "24513", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/24513" }, { "name" : "24577", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/24577" }, { "name" : "25220", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/25220" }, { "name" : "24284", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/24284" }, { "name" : "postgresql-sqlfunctions-info-disclosure(32195)", "refsource" : "XF", "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32195" } ] } }