Debian Security Advisory

DSA-516-1 postgresql -- buffer overflow

Date Reported:
07 Jun 2004
Affected Packages:
Security database references:
In the Debian bugtracking system: Bug 247306.
In the Bugtraq database (at SecurityFocus): BugTraq ID 10470.
In Mitre's CVE dictionary: CVE-2004-0547.
More information:

A buffer overflow has been discovered in the ODBC driver of PostgreSQL, an object-relational SQL database, descended from POSTGRES. It is possible to exploit this problem and crash the surrounding application. Hence, a PHP script using php4-odbc can be utilised to crash the surrounding Apache webserver. Other parts of postgresql are not affected.

For the stable distribution (woody) this problem has been fixed in version 7.2.1-2woody5.

For the unstable distribution (sid) this problem has been fixed in version 07.03.0200-3.

We recommend that you upgrade your postgresql and related package.

Fixed in:

Debian GNU/Linux 3.0 (woody)

Architecture-independent component:
Intel IA-32:
Intel IA-64:
Motorola 680x0:
Big endian MIPS:
Little endian MIPS:
IBM S/390:
Sun Sparc:

MD5 checksums of the listed files are available in the original advisory.