Lucene search

K
nvd[email protected]NVD:CVE-2016-5423
HistoryDec 09, 2016 - 11:59 p.m.

CVE-2016-5423

2016-12-0923:59:00
CWE-476
web.nvd.nist.gov

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

8.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H

8.8 High

AI Score

Confidence

High

0.01 Low

EPSS

Percentile

83.9%

PostgreSQL before 9.1.23, 9.2.x before 9.2.18, 9.3.x before 9.3.14, 9.4.x before 9.4.9, and 9.5.x before 9.5.4 allow remote authenticated users to cause a denial of service (NULL pointer dereference and server crash), obtain sensitive memory information, or possibly execute arbitrary code via (1) a CASE expression within the test value subexpression of another CASE or (2) inlining of an SQL function that implements the equality operator used for a CASE expression involving values of different types.

Affected configurations

NVD
Node
debiandebian_linuxMatch8.0
Node
postgresqlpostgresqlRange9.1.22
OR
postgresqlpostgresqlMatch9.2
OR
postgresqlpostgresqlMatch9.2.1
OR
postgresqlpostgresqlMatch9.2.2
OR
postgresqlpostgresqlMatch9.2.3
OR
postgresqlpostgresqlMatch9.2.4
OR
postgresqlpostgresqlMatch9.2.5
OR
postgresqlpostgresqlMatch9.2.6
OR
postgresqlpostgresqlMatch9.2.7
OR
postgresqlpostgresqlMatch9.2.8
OR
postgresqlpostgresqlMatch9.2.9
OR
postgresqlpostgresqlMatch9.2.10
OR
postgresqlpostgresqlMatch9.2.11
OR
postgresqlpostgresqlMatch9.2.12
OR
postgresqlpostgresqlMatch9.2.13
OR
postgresqlpostgresqlMatch9.2.14
OR
postgresqlpostgresqlMatch9.2.15
OR
postgresqlpostgresqlMatch9.2.16
OR
postgresqlpostgresqlMatch9.2.17
OR
postgresqlpostgresqlMatch9.3
OR
postgresqlpostgresqlMatch9.3.1
OR
postgresqlpostgresqlMatch9.3.2
OR
postgresqlpostgresqlMatch9.3.3
OR
postgresqlpostgresqlMatch9.3.4
OR
postgresqlpostgresqlMatch9.3.5
OR
postgresqlpostgresqlMatch9.3.6
OR
postgresqlpostgresqlMatch9.3.7
OR
postgresqlpostgresqlMatch9.3.8
OR
postgresqlpostgresqlMatch9.3.9
OR
postgresqlpostgresqlMatch9.3.10
OR
postgresqlpostgresqlMatch9.3.11
OR
postgresqlpostgresqlMatch9.3.12
OR
postgresqlpostgresqlMatch9.3.13
OR
postgresqlpostgresqlMatch9.4
OR
postgresqlpostgresqlMatch9.4.1
OR
postgresqlpostgresqlMatch9.4.2
OR
postgresqlpostgresqlMatch9.4.3
OR
postgresqlpostgresqlMatch9.4.4
OR
postgresqlpostgresqlMatch9.4.5
OR
postgresqlpostgresqlMatch9.4.6
OR
postgresqlpostgresqlMatch9.4.7
OR
postgresqlpostgresqlMatch9.4.8
OR
postgresqlpostgresqlMatch9.5
OR
postgresqlpostgresqlMatch9.5.1
OR
postgresqlpostgresqlMatch9.5.2
OR
postgresqlpostgresqlMatch9.5.3

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

8.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H

8.8 High

AI Score

Confidence

High

0.01 Low

EPSS

Percentile

83.9%