Intrusion Prevention

PostgreSQL.Database.Datetime.Buffer.Overflow

Description

This indicates an attack attempt against a Stack Buffer Overflow vulnerability in PostgreSQL database server.
The vulnerability is due to insufficient sanitizing of user supplied inputs in the application when handling a crafted request. A remote attacker may be able to exploit this to execute arbitrary code within the context of the application, via a crafted request to the vulnerable service.

Affected Products

PostgreSQL PostgreSQL prior to 8.4.20
PostgreSQL PostgreSQL prior to 9.0.16
PostgreSQL PostgreSQL prior to 9.1.12
PostgreSQL PostgreSQL prior to 9.2.7
PostgreSQL PostgreSQL prior to 9.3.3

Impact

System Compromise: Remote attackers can execute arbitrary code in the context of the affected application.

Recommended Actions

Apply the most recent upgrade or patch from the vendor.
http://git.postgresql.org/gitweb/?p=postgresql.git;a=commit;h=d0ed1a6c044452a529c1d544647ea1fcb90dcb81

CVE References

CVE-2014-0063

Other References

http://wiki.postgresql.org/wiki/20140220securityrelease# Potential_Buffer_Overruns_in_Datetime_Input.2FOutput