CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
17.1%
Npgsql is the .NET data provider for PostgreSQL. The WriteBind()
method
in src/Npgsql/Internal/NpgsqlConnector.FrontendMessages.cs
uses int
variables to store the message length and the sum of parameter lengths.
Both variables overflow when the sum of parameter lengths becomes too
large. This causes Npgsql to write a message size that is too small when
constructing a Postgres protocol message to send it over the network to the
database. When parsing the message, the database will only read a small
number of bytes and treat any following bytes as new messages while they
belong to the old message. Attackers can abuse this to inject arbitrary
Postgres protocol messages into the connection, leading to the execution of
arbitrary SQL statements on the application’s behalf. This vulnerability is
fixed in 4.0.14, 4.1.13, 5.0.18, 6.0.11, 7.0.7, and 8.0.3.
github.com/npgsql/npgsql/commit/f7e7ead0702d776a8f551f5786c4cac2d65c4bc6
github.com/npgsql/npgsql/security/advisories/GHSA-x9vc-6hfv-hg8c
launchpad.net/bugs/cve/CVE-2024-32655
nvd.nist.gov/vuln/detail/CVE-2024-32655
security-tracker.debian.org/tracker/CVE-2024-32655
www.cve.org/CVERecord?id=CVE-2024-32655
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
17.1%