Vulnerability Details : CVE-2015-3165
Double free vulnerability in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 allows remote attackers to cause a denial of service (crash) by closing an SSL session at a time when the authentication timeout will expire during the session shutdown sequence.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2015-3165
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:5.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.1.8:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.1.9:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.1.11:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.1.10:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.2.10:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.2.9:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.1.12:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.1.13:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.1.14:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.1.15:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
Threat overview for CVE-2015-3165
Top countries where our scanners detected CVE-2015-3165
Top open port discovered on systems with this issue
5432
IPs affected by CVE-2015-3165 102,412
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2015-3165!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2015-3165
8.54%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-3165
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
NIST |
References for CVE-2015-3165
-
http://www.postgresql.org/docs/9.2/static/release-9-2-11.html
PostgreSQL: Documentation: 9.2: Release 9.2.11Release Notes
-
http://rhn.redhat.com/errata/RHSA-2015-1196.html
RHSA-2015:1196 - Security Advisory - Red Hat Customer Portal
-
https://security.gentoo.org/glsa/201507-20
PostgreSQL: Multiple vulnerabilities (GLSA 201507-20) — Gentoo security
-
http://www.ubuntu.com/usn/USN-2621-1
USN-2621-1: PostgreSQL vulnerabilities | Ubuntu security noticesVendor Advisory
-
http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html
Apple - Lists.apple.comMailing List;Third Party Advisory
-
http://www.postgresql.org/docs/9.3/static/release-9-3-7.html
PostgreSQL: Documentation: 9.3: Release 9.3.7Release Notes
-
http://rhn.redhat.com/errata/RHSA-2015-1194.html
RHSA-2015:1194 - Security Advisory - Red Hat Customer Portal
-
http://www.postgresql.org/about/news/1587/
PostgreSQL: PostgreSQL 9.4.2, 9.3.7, 9.2.11, 9.1.16, and 9.0.20 released!Vendor Advisory
-
http://www.debian.org/security/2015/dsa-3270
Debian -- Security Information -- DSA-3270-1 postgresql-9.4Third Party Advisory
-
http://www.postgresql.org/docs/9.1/static/release-9-1-16.html
PostgreSQL: Documentation: 9.1: Release 9.1.16Release Notes
-
http://rhn.redhat.com/errata/RHSA-2015-1195.html
RHSA-2015:1195 - Security Advisory - Red Hat Customer Portal
-
http://www.securityfocus.com/bid/74787
PostgreSQL CVE-2015-3165 Remote Denial Of Service VulnerabilityThird Party Advisory;VDB Entry
-
https://support.apple.com/HT205219
About the security content of OS X Server v5.0.3 - Apple SupportThird Party Advisory
-
http://www.postgresql.org/docs/9.4/static/release-9-4-2.html
PostgreSQL: Documentation: 9.4: Release 9.4.2Release Notes
-
http://www.debian.org/security/2015/dsa-3269
Debian -- Security Information -- DSA-3269-1 postgresql-9.1Third Party Advisory
-
http://www.postgresql.org/docs/9.0/static/release-9-0-20.html
PostgreSQL: Documentation: 9.0: Release 9.0.20Release Notes
Jump to