Vulnerability Details : CVE-2010-4015
Buffer overflow in the gettoken function in contrib/intarray/_int_bool.c in the intarray array module in PostgreSQL 9.0.x before 9.0.3, 8.4.x before 8.4.7, 8.3.x before 8.3.14, and 8.2.x before 8.2.20 allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via integers with a large number of digits to unspecified functions.
Vulnerability category: OverflowExecute codeDenial of service
Threat overview for CVE-2010-4015
Top countries where our scanners detected CVE-2010-4015
Top open port discovered on systems with this issue
5432
IPs affected by CVE-2010-4015 26,618
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2010-4015!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2010-4015
Probability of exploitation activity in the next 30 days: 1.88%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 87 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2010-4015
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST |
CWE ids for CVE-2010-4015
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-4015
-
http://www.redhat.com/support/errata/RHSA-2011-0198.html
Support
-
http://www.ubuntu.com/usn/USN-1058-1
USN-1058-1: PostgreSQL vulnerability | Ubuntu security notices
-
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
[security-announce] SUSE Security Summary Report: SUSE-SR:2011:005
-
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
Juniper Networks - 2015-10 Security Bulletin: CTPView: Multiple Vulnerabilities in CTPView
-
http://www.vupen.com/english/advisories/2011/0287
Webmail | OVH- OVH
-
http://marc.info/?l=bugtraq&m=134124585221119&w=2
'[security bulletin] HPSBMU02781 SSRT100617 rev.1 - HP Network Node Manager i (NNMi) for HP-UX, Linux' - MARC
-
http://www.postgresql.org/about/news.1289
PostgreSQL: Not Found
-
http://www.vupen.com/english/advisories/2011/0349
Webmail | OVH- OVH
-
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053888.html
[SECURITY] Fedora 13 Update: postgresql-8.4.7-1.fc13
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/65060
PostgreSQL gettoken() function buffer overflow CVE-2010-4015 Vulnerability Report
-
http://www.debian.org/security/2011/dsa-2157
Debian -- Security Information -- DSA-2157-1 postgresql-8.3, postgresql-8.4, postgresql-9.0
-
http://www.vupen.com/english/advisories/2011/0278
Webmail | OVH- OVH
-
http://www.vupen.com/english/advisories/2011/0262
Webmail | OVH- OVHVendor Advisory
-
http://git.postgresql.org/gitweb?p=postgresql.git;a=commitdiff;h=7ccb6dc2d3e266a551827bb99179708580f72431
git.postgresql.org Git - postgresql.git/commitdiffPatch
-
http://www.vupen.com/english/advisories/2011/0299
Webmail | OVH- OVH
-
http://www.vupen.com/english/advisories/2011/0283
Webmail | OVH- OVH
-
http://www.securityfocus.com/bid/46084
PostgreSQL 'intarray' Module 'gettoken()' Buffer Overflow Vulnerability
-
http://www.mandriva.com/security/advisories?name=MDVSA-2011:021
mandriva.com
-
http://www.vupen.com/english/advisories/2011/0303
Webmail | OVH- OVH
-
http://www.redhat.com/support/errata/RHSA-2011-0197.html
Support
-
http://www.postgresql.org/support/security
PostgreSQL: Security Information
-
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053817.html
[SECURITY] Fedora 14 Update: postgresql-8.4.7-1.fc14
Products affected by CVE-2010-4015
- cpe:2.3:a:postgresql:postgresql:8.2:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:8.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:8.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:8.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:8.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:8.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:8.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:8.2.12:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:8.4:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:8.3:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:8.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:8.2.13:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:8.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:8.2.10:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:8.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:8.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:8.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:8.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:8.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:8.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:8.2.11:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:8.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:8.2.9:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:8.2.14:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:8.3.8:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:8.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:8.2.16:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:8.2.15:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:8.3.10:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:8.3.9:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:8.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:8.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:8.2.17:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:8.3.11:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:8.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:8.3.13:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:8.3.12:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:8.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:8.4.6:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:8.2.19:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:8.2.18:*:*:*:*:*:*:*