Lucene search

K
nvd[email protected]NVD:CVE-2023-5868
HistoryDec 10, 2023 - 6:15 p.m.

CVE-2023-5868

2023-12-1018:15:07
CWE-686
web.nvd.nist.gov
postgresql
memory disclosure
remote users
sensitive information
aggregate function
'unknown'-type
string literals
data output

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

0.002 Low

EPSS

Percentile

55.4%

A memory disclosure vulnerability was found in PostgreSQL that allows remote users to access sensitive information by exploiting certain aggregate function calls with ‘unknown’-type arguments. Handling ‘unknown’-type values from string literals without type designation can disclose bytes, potentially revealing notable and confidential information. This issue exists due to excessive data output in aggregate function calls, enabling remote users to read some portion of system memory.

Affected configurations

NVD
Node
postgresqlpostgresqlRange11.011.22
OR
postgresqlpostgresqlRange12.012.17
OR
postgresqlpostgresqlRange13.013.13
OR
postgresqlpostgresqlRange14.014.10
OR
postgresqlpostgresqlRange15.015.5
OR
postgresqlpostgresqlMatch16.0
Node
redhatcodeready_linux_builder_eusMatch9.2
OR
redhatcodeready_linux_builder_eus_for_power_little_endian_eusMatch9.0_ppc64le
OR
redhatcodeready_linux_builder_eus_for_power_little_endian_eusMatch9.2_ppc64le
OR
redhatcodeready_linux_builder_for_arm64_eusMatch8.6_aarch64
OR
redhatcodeready_linux_builder_for_arm64_eusMatch9.0_aarch64
OR
redhatcodeready_linux_builder_for_arm64_eusMatch9.2_aarch64
OR
redhatcodeready_linux_builder_for_ibm_z_systems_eusMatch9.0_s390x
OR
redhatcodeready_linux_builder_for_ibm_z_systems_eusMatch9.2_s390x
OR
redhatcodeready_linux_builder_for_power_little_endian_eusMatch9.0_ppc64le
OR
redhatcodeready_linux_builder_for_power_little_endian_eusMatch9.2_ppc64le
OR
redhatsoftware_collectionsMatch1.0
OR
redhatenterprise_linuxMatch8.0
OR
redhatenterprise_linuxMatch9.0
OR
redhatenterprise_linux_eusMatch8.6
OR
redhatenterprise_linux_eusMatch8.8
OR
redhatenterprise_linux_eusMatch9.0
OR
redhatenterprise_linux_eusMatch9.2
OR
redhatenterprise_linux_for_arm_64Match8.0
OR
redhatenterprise_linux_for_arm_64Match8.8_aarch64
OR
redhatenterprise_linux_for_ibm_z_systemsMatch8.0_s390x
OR
redhatenterprise_linux_for_ibm_z_systems_eusMatch8.6_s390x
OR
redhatenterprise_linux_for_ibm_z_systems_eusMatch8.8_s390x
OR
redhatenterprise_linux_for_ibm_z_systems_eusMatch9.0_s390x
OR
redhatenterprise_linux_for_ibm_z_systems_eusMatch9.2_s390x
OR
redhatenterprise_linux_for_power_little_endianMatch8.0_ppc64le
OR
redhatenterprise_linux_for_power_little_endian_eusMatch8.6_ppc64le
OR
redhatenterprise_linux_for_power_little_endian_eusMatch8.8_ppc64le
OR
redhatenterprise_linux_for_power_little_endian_eusMatch9.0_ppc64le
OR
redhatenterprise_linux_for_power_little_endian_eusMatch9.2_ppc64le
OR
redhatenterprise_linux_server_ausMatch8.2
OR
redhatenterprise_linux_server_ausMatch8.4
OR
redhatenterprise_linux_server_ausMatch8.6
OR
redhatenterprise_linux_server_ausMatch9.2
OR
redhatenterprise_linux_server_tusMatch8.2
OR
redhatenterprise_linux_server_tusMatch8.4
OR
redhatenterprise_linux_server_tusMatch8.6

References

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

0.002 Low

EPSS

Percentile

55.4%