CVE-2005-1409
Published May 3, 2005
Last updated 6 years ago
Overview
- Description
- PostgreSQL 7.3.x through 8.0.x gives public EXECUTE access to certain character conversion functions, which allows unprivileged users to call those functions with malicious values, with unknown impact, aka the "Character conversion vulnerability."
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:postgresql:postgresql:7.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AFF09CFB-F7CE-4659-BB20-83231539F765" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EFE8C2A3-7575-41C6-896C-C367E6D35015" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "88ED8E8C-9044-4E77-923A-D5C6C02A1081" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "037FF208-82A1-4448-88FE-FACB922FE1E0" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "458F558C-7550-48B8-8318-A0D5FAF9ABF8" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BF1A6E7C-B1DC-45CC-90B4-AFD6F669AA94" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "23B710BA-91FF-47B9-BB56-4711CD50D50F" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4064A96D-84D5-4257-9981-1139CD4CD08C" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C98290E4-2919-4492-BD14-BB24BA85C729" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B56E9F72-6CBF-4784-89CD-435A030AC0B0" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6DEF0FE5-EFCF-448E-B6BD-95FDDD4E17FD" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "03B480F0-8FFC-4463-ADC6-95906751811C" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9BF44286-0DBF-4CCA-8FFB-993976C18CDB" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.3.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "629881D2-2A6D-4461-8C35-6EE575B63E6E" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.3.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E5C91580-6428-4234-92DF-6A96108FCF7C" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.3.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B5A19EB5-A1AF-4293-854D-347CD21065DA" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.3.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B18ED293-B408-435F-9D1F-2365A2E51022" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FBE2567C-BF48-4255-9E56-590A6F9DD932" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C8DDD98-9A2D-402D-9172-F3C4C4C97FEF" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "20C8302B-631A-4DF7-839B-C6F3CC39E000" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB318EB9-1B49-452A-92CF-89D9BA990AB9" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5913A53B-7B72-4CBD-ADAE-318333EB8B7B" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "815E58C0-327D-4F14-B496-05FC8179627E" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3EF2D056-5120-4F98-8343-4EC31F962CFE" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "516E0E86-3D8A-43F9-9DD5-865F5C889FC4" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "94222D76-82BE-4FFB-BE4B-5DBAF3080D4D" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:8.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "91D1232E-4D0A-4BDC-99F6-25AEE014E9AE" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:8.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "105E9F52-D17E-4A0B-9C46-FD32A930B1E6" } ], "operator": "OR" } ] } ]