Vulnerabilità: CVE-2007-0555

PostgreSQL 7.3 prima 7.3.13, 7.4 prima 7.4.16, 8.0 prima 8.0.11, 8.1 prima 8.1.7 e 8.2.2 8.2 prima consente agli aggressori di certi controlli disabilitare i tipi di dati di argomenti di una funzione SQL, che consente remoto autenticati agli utenti di causare un denial of service (crash del server) e il contenuto del database, eventualmente, l’accesso.


http://www.securityfocus.com/bid/22387
http://www.securityfocus.com/archive/1/459280/100/0/threaded
http://www.securityfocus.com/archive/1/459448/100/0/threaded
http://support.avaya.com/elmodocs2/security/ASA-2007-117.htm
http://www.postgresql.org/support/security
https://issues.rpath.com/browse/RPL-1025
https://issues.rpath.com/browse/RPL-830
http://www.debian.org/security/2007/dsa-1261
http://fedoranews.org/cms/node/2554
http://security.gentoo.org/glsa/glsa-200703-15.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2007:037
http://lists.rpath.com/pipermail/security-announce/2007-February/000141.html
http://osvdb.org/33087
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9739
http://www.redhat.com/support/errata/RHSA-2007-0064.html
http://www.redhat.com/support/errata/RHSA-2007-0067.html
http://www.redhat.com/support/errata/RHSA-2007-0068.html
http://securitytracker.com/id?1017597
http://secunia.com/advisories/24028
http://secunia.com/advisories/24033
http://secunia.com/advisories/24042
http://secunia.com/advisories/24050
http://secunia.com/advisories/24057
http://secunia.com/advisories/24094
http://secunia.com/advisories/24151
http://secunia.com/advisories/24158
http://secunia.com/advisories/24284
http://secunia.com/advisories/24315
http://secunia.com/advisories/24513
http://secunia.com/advisories/24577
http://secunia.com/advisories/25220
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102825-1
http://www.novell.com/linux/security/advisories/2007_10_sr.html
http://www.trustix.org/errata/2007/0007
https://usn.ubuntu.com/417-1/
http://www.ubuntu.com/usn/usn-417-2
http://www.vupen.com/english/advisories/2007/0478
http://www.vupen.com/english/advisories/2007/0774
https://exchange.xforce.ibmcloud.com/vulnerabilities/32195
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0555


E' possibile lasciare un commento come utenti registrati al sito, accedendo tramite social, account wordpress oppure come utenti anonimi. Nel caso in cui si desideri lasciare un commento come utenti anonimi si verrà avvisati via email di un'eventuale risposta solo se si inserisce l'indirizzo email (facoltativo). L'inserimento di qualsiasi dato nei campi dei commenti è totalmente facoltativo. Chiunque decida di inserire un qualsiasi dato accetta il trattamento di questi ultimi per i fini inerenti al servizio ovvero la risposta al commento e le comunicazioni strettamente necessarie.


Rispondi