Computer Security
[EN] securityvulns.ru no-pyccku


Perl DBD::Pg module buffer overflow
Published:29.12.2009
Source:
SecurityVulns ID:10494
Type:library
Threat Level:
5/10
Description:pg_getline buffer overflow, DoS.
CVE:CVE-2009-1341 (Memory leak in the dequote_bytea function in quote.c in the DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module before 2.0.0 for Perl allows context-dependent attackers to cause a denial of service (memory consumption) by fetching data with BYTEA columns.)
 CVE-2009-0663 (Heap-based buffer overflow in the DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module 1.49 for Perl might allow context-dependent attackers to execute arbitrary code via unspecified input to an application that uses the getline and pg_getline functions to read database rows.)
Original documentdocumentMANDRIVA, [ MDVSA-2009:344 ] perl-DBD-Pg (29.12.2009)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod