PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 does not properly handle errors while reading a protocol message, which allows remote attackers to conduct SQL injection attacks via crafted binary data in a parameter and causing an error, which triggers the loss of synchronization and part of the protocol message to be treated as a new message, as demonstrated by causing a timeout or query cancellation.
[
{
"product": "PostgreSQL",
"vendor": "PostgreSQL Global Development Group",
"versions": [
{
"status": "affected",
"version": "before 9.0.19"
},
{
"status": "affected",
"version": "9.1.x before 9.1.15"
},
{
"status": "affected",
"version": "9.2.x before 9.2.10"
},
{
"status": "affected",
"version": "9.3.x before 9.3.6"
},
{
"status": "affected",
"version": "9.4.x before 9.4.1"
}
]
}
]
www.debian.org/security/2015/dsa-3155
www.postgresql.org/about/news/1569/
www.postgresql.org/docs/9.4/static/release-9-4-1.html
www.postgresql.org/docs/current/static/release-9-0-19.html
www.postgresql.org/docs/current/static/release-9-1-15.html
www.postgresql.org/docs/current/static/release-9-2-10.html
www.postgresql.org/docs/current/static/release-9-3-6.html