CVE-2006-5541

backend/parser/parse_coerce.c in PostgreSQL 7.4.1 through 7.4.14, 8.0.x before 8.0.9, and 8.1.x before 8.1.5 allows remote authenticated users to cause a denial of service (daemon crash) via a coercion of an unknown element to ANYARRAY.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*

History

12 Oct 2023, 13:28

Type Values Removed Values Added
CWE NVD-CWE-Other NVD-CWE-noinfo
References (TRUSTIX) http://www.trustix.org/errata/2006/0059/ - (TRUSTIX) http://www.trustix.org/errata/2006/0059/ - Third Party Advisory
References (CONFIRM) http://support.avaya.com/elmodocs2/security/ASA-2007-117.htm - (CONFIRM) http://support.avaya.com/elmodocs2/security/ASA-2007-117.htm - Third Party Advisory
References (SECTRACK) http://securitytracker.com/id?1017115 - (SECTRACK) http://securitytracker.com/id?1017115 - Third Party Advisory, URL Repurposed, VDB Entry
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10905 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10905 - Broken Link
References (SECUNIA) http://secunia.com/advisories/22562 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/22562 - URL Repurposed
References (SECUNIA) http://secunia.com/advisories/22636 - (SECUNIA) http://secunia.com/advisories/22636 - URL Repurposed
References (CONFIRM) http://www.postgresql.org/about/news.664 - Patch (CONFIRM) http://www.postgresql.org/about/news.664 - Broken Link, Patch
References (SECUNIA) http://secunia.com/advisories/22606 - (SECUNIA) http://secunia.com/advisories/22606 - URL Repurposed
References (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDKSA-2006:194 - (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDKSA-2006:194 - Broken Link
References (CONFIRM) http://support.novell.com/techcenter/psdb/59650c03a8bc5ae310cd7898bd106ad2.html - (CONFIRM) http://support.novell.com/techcenter/psdb/59650c03a8bc5ae310cd7898bd106ad2.html - Third Party Advisory
References (CONFIRM) http://projects.commandprompt.com/public/pgsql/changeset/26457 - (CONFIRM) http://projects.commandprompt.com/public/pgsql/changeset/26457 - Broken Link
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2007-0068.html - (REDHAT) http://www.redhat.com/support/errata/RHSA-2007-0068.html - Broken Link
References (SECUNIA) http://secunia.com/advisories/23132 - (SECUNIA) http://secunia.com/advisories/23132 - URL Repurposed
References (SUSE) http://www.novell.com/linux/security/advisories/2006_27_sr.html - (SUSE) http://www.novell.com/linux/security/advisories/2006_27_sr.html - Broken Link
References (BID) http://www.securityfocus.com/bid/20717 - Patch (BID) http://www.securityfocus.com/bid/20717 - Patch, Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/24577 - (SECUNIA) http://secunia.com/advisories/24577 - URL Repurposed
References (UBUNTU) http://www.ubuntu.com/usn/usn-369-1 - (UBUNTU) http://www.ubuntu.com/usn/usn-369-1 - Third Party Advisory
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2007-0067.html - (REDHAT) http://www.redhat.com/support/errata/RHSA-2007-0067.html - URL Repurposed
References (SECUNIA) http://secunia.com/advisories/22584 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/22584 - URL Repurposed
References (UBUNTU) http://www.ubuntu.com/usn/usn-369-2 - (UBUNTU) http://www.ubuntu.com/usn/usn-369-2 - Third Party Advisory
References (VUPEN) http://www.vupen.com/english/advisories/2006/4182 - (VUPEN) http://www.vupen.com/english/advisories/2006/4182 - URL Repurposed
References (SECUNIA) http://secunia.com/advisories/23048 - (SECUNIA) http://secunia.com/advisories/23048 - URL Repurposed
CPE cpe:2.3:a:postgresql:postgresql:7.4.13:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.1:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.0:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.0.4:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:7.4.9:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.0.7:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:7.4.10:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.0.6:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.1.3:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:7.4.11:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.0.5:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.0.2:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:7.4.8:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.1.1:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.1.4:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.0.3:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.1.2:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.0.8:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:7.4.14:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.0.1:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:7.4.12:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*

Information

Published : 2006-10-26 17:07

Updated : 2024-02-28 11:01


NVD link : CVE-2006-5541

Mitre link : CVE-2006-5541

CVE.ORG link : CVE-2006-5541


JSON object : View

Products Affected

postgresql

  • postgresql