5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.029 Low
EPSS
Percentile
90.7%
Issue Overview:
Two format string flaws were found in perl-DBD-Pg. A specially-crafted database warning or error message from a server could cause an application using perl-DBD-Pg to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2012-1151)
Affected Packages:
perl-DBD-Pg
Issue Correction:
Run yum update perl-DBD-Pg to update your system.
New Packages:
i686:
perl-DBD-Pg-2.15.1-4.3.amzn1.i686
perl-DBD-Pg-debuginfo-2.15.1-4.3.amzn1.i686
src:
perl-DBD-Pg-2.15.1-4.3.amzn1.src
x86_64:
perl-DBD-Pg-debuginfo-2.15.1-4.3.amzn1.x86_64
perl-DBD-Pg-2.15.1-4.3.amzn1.x86_64
Red Hat: CVE-2012-1151
Mitre: CVE-2012-1151
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | i686 | perl-dbd-pg | < 2.15.1-4.3.amzn1 | perl-DBD-Pg-2.15.1-4.3.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | perl-dbd-pg-debuginfo | < 2.15.1-4.3.amzn1 | perl-DBD-Pg-debuginfo-2.15.1-4.3.amzn1.i686.rpm |
Amazon Linux | 1 | x86_64 | perl-dbd-pg-debuginfo | < 2.15.1-4.3.amzn1 | perl-DBD-Pg-debuginfo-2.15.1-4.3.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | perl-dbd-pg | < 2.15.1-4.3.amzn1 | perl-DBD-Pg-2.15.1-4.3.amzn1.x86_64.rpm |