CVE-2006-0678
Published Feb 14, 2006
Last updated 6 years ago
Overview
- Description
- PostgreSQL 7.3.x before 7.3.14, 7.4.x before 7.4.12, 8.0.x before 8.0.7, and 8.1.x before 8.1.3, when compiled with Asserts enabled, allows local users to cause a denial of service (server crash) via a crafted SET SESSION AUTHORIZATION command, a different vulnerability than CVE-2006-0553.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 1.5
- Impact score
- 2.9
- Exploitability score
- 2.7
- Vector string
- AV:L/AC:M/Au:S/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:postgresql:postgresql:7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4064A96D-84D5-4257-9981-1139CD4CD08C" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C98290E4-2919-4492-BD14-BB24BA85C729" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B56E9F72-6CBF-4784-89CD-435A030AC0B0" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6DEF0FE5-EFCF-448E-B6BD-95FDDD4E17FD" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "03B480F0-8FFC-4463-ADC6-95906751811C" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9BF44286-0DBF-4CCA-8FFB-993976C18CDB" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.3.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "629881D2-2A6D-4461-8C35-6EE575B63E6E" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.3.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E5C91580-6428-4234-92DF-6A96108FCF7C" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.3.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B5A19EB5-A1AF-4293-854D-347CD21065DA" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.3.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B18ED293-B408-435F-9D1F-2365A2E51022" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.3.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E7106B29-76F3-43FD-BF57-4693D5B55076" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.3.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "16B804CD-AE47-4B46-9B37-7F46D4C9A332" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.3.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D23E89A3-551D-42E2-90EC-59A9DAB4F854" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.3.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2FC46594-100B-459F-BCB7-1FA9D0719D76" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FBE2567C-BF48-4255-9E56-590A6F9DD932" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C8DDD98-9A2D-402D-9172-F3C4C4C97FEF" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "20C8302B-631A-4DF7-839B-C6F3CC39E000" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB318EB9-1B49-452A-92CF-89D9BA990AB9" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5913A53B-7B72-4CBD-ADAE-318333EB8B7B" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "815E58C0-327D-4F14-B496-05FC8179627E" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3EF2D056-5120-4F98-8343-4EC31F962CFE" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "516E0E86-3D8A-43F9-9DD5-865F5C889FC4" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5A7A9D3C-4BB6-4974-BF96-6E6728196F4E" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "486EDE1B-37E0-4DDF-BFC9-C8C8945D5E2A" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A7FC7F18-B227-4C46-9A33-FB34DDE456CC" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BCDB903F-0C89-4E65-857E-553CF9C192E8" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "94222D76-82BE-4FFB-BE4B-5DBAF3080D4D" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:8.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "91D1232E-4D0A-4BDC-99F6-25AEE014E9AE" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:8.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "105E9F52-D17E-4A0B-9C46-FD32A930B1E6" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:8.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0DE2055D-AAA4-4A6A-918F-349A9749AF09" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:8.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C12409B2-161B-4F78-B7AD-3CF69DDCC574" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:8.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD2F1DA4-6625-469D-988B-5457B68851A9" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:8.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "870F4348-6001-4C2F-A547-61964074E7C0" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2AF590F2-899F-42E1-8A57-6F514C94CE4F" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:8.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FEEC35A2-B17C-46EC-8697-9E03568339BC" }, { "criteria": "cpe:2.3:a:postgresql:postgresql:8.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "00562C18-DD81-4B09-AF93-739AF8757A12" } ], "operator": "OR" } ] } ]