CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
85.2%
PostgreSQL 8.1.x before 8.1.4, 8.0.x before 8.0.8, 7.4.x before 7.4.13, 7.3.x before 7.3.15, and earlier versions allows context-dependent attackers to bypass SQL injection protection methods in applications that use multibyte encodings that allow the "" (backslash) byte 0x5c to be the trailing byte of a multibyte character, such as SJIS, BIG5, GBK, GB18030, and UHC, which cannot be handled correctly by a client that does not understand multibyte encodings, aka a second variant of “Encoding-Based SQL Injection.” NOTE: it could be argued that this is a class of issue related to interaction errors between the client and PostgreSQL, but a CVE has been assigned since PostgreSQL is treating this as a preventative measure against this class of problem.
Vendor | Product | Version | CPE |
---|---|---|---|
postgresql | postgresql | 7.3 | cpe:2.3:a:postgresql:postgresql:7.3:*:*:*:*:*:*:* |
postgresql | postgresql | 7.3.1 | cpe:2.3:a:postgresql:postgresql:7.3.1:*:*:*:*:*:*:* |
postgresql | postgresql | 7.3.2 | cpe:2.3:a:postgresql:postgresql:7.3.2:*:*:*:*:*:*:* |
postgresql | postgresql | 7.3.3 | cpe:2.3:a:postgresql:postgresql:7.3.3:*:*:*:*:*:*:* |
postgresql | postgresql | 7.3.4 | cpe:2.3:a:postgresql:postgresql:7.3.4:*:*:*:*:*:*:* |
postgresql | postgresql | 7.3.5 | cpe:2.3:a:postgresql:postgresql:7.3.5:*:*:*:*:*:*:* |
postgresql | postgresql | 7.3.6 | cpe:2.3:a:postgresql:postgresql:7.3.6:*:*:*:*:*:*:* |
postgresql | postgresql | 7.3.7 | cpe:2.3:a:postgresql:postgresql:7.3.7:*:*:*:*:*:*:* |
postgresql | postgresql | 7.3.8 | cpe:2.3:a:postgresql:postgresql:7.3.8:*:*:*:*:*:*:* |
postgresql | postgresql | 7.3.9 | cpe:2.3:a:postgresql:postgresql:7.3.9:*:*:*:*:*:*:* |
ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc
archives.postgresql.org/pgsql-announce/2006-05/msg00010.php
lists.suse.com/archive/suse-security-announce/2006-Jun/0002.html
secunia.com/advisories/20231
secunia.com/advisories/20232
secunia.com/advisories/20314
secunia.com/advisories/20435
secunia.com/advisories/20451
secunia.com/advisories/20503
secunia.com/advisories/20555
secunia.com/advisories/20653
secunia.com/advisories/20782
secunia.com/advisories/21001
secunia.com/advisories/21749
security.gentoo.org/glsa/glsa-200607-04.xml
securitytracker.com/id?1016142
support.avaya.com/elmodocs2/security/ASA-2006-113.htm
www.debian.org/security/2006/dsa-1087
www.mandriva.com/security/advisories?name=MDKSA-2006:098
www.novell.com/linux/security/advisories/2006_21_sr.html
www.osvdb.org/25731
www.postgresql.org/docs/techdocs.50
www.redhat.com/support/errata/RHSA-2006-0526.html
www.securityfocus.com/archive/1/435038/100/0/threaded
www.securityfocus.com/archive/1/435161/100/0/threaded
www.securityfocus.com/bid/18092
www.trustix.org/errata/2006/0032/
www.ubuntu.com/usn/usn-288-2
www.ubuntu.com/usn/usn-288-3
www.vupen.com/english/advisories/2006/1941
exchange.xforce.ibmcloud.com/vulnerabilities/26627
exchange.xforce.ibmcloud.com/vulnerabilities/26628
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9947
usn.ubuntu.com/288-1/