Vulnerability identifier: #VU33829
Vulnerability risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2015-3165
CWE-ID:
CWE-20
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
PostgreSQL
Server applications /
Database software
Vendor: PostgreSQL Global Development Group
Description
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
Double free vulnerability in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 allows remote attackers to cause a denial of service (crash) by closing an SSL session at a time when the authentication timeout will expire during the session shutdown sequence. <a href="http://cwe.mitre.org/data/definitions/415.html">CWE-415: Double Free</a>
Mitigation
Install update from vendor's website.
Vulnerable software versions
PostgreSQL: 9.0.0 - 9.0.19, 9.1.0 - 9.1.15, 9.2.0 - 9.2.10, 9.3.0 - 9.3.6, 9.4.0 - 9.4.1
External links
https://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html
https://rhn.redhat.com/errata/RHSA-2015-1194.html
https://rhn.redhat.com/errata/RHSA-2015-1195.html
https://rhn.redhat.com/errata/RHSA-2015-1196.html
https://www.debian.org/security/2015/dsa-3269
https://www.debian.org/security/2015/dsa-3270
https://www.postgresql.org/about/news/1587/
https://www.postgresql.org/docs/9.0/static/release-9-0-20.html
https://www.postgresql.org/docs/9.1/static/release-9-1-16.html
https://www.postgresql.org/docs/9.2/static/release-9-2-11.html
https://www.postgresql.org/docs/9.3/static/release-9-3-7.html
https://www.postgresql.org/docs/9.4/static/release-9-4-2.html
https://www.securityfocus.com/bid/74787
https://www.ubuntu.com/usn/USN-2621-1
https://security.gentoo.org/glsa/201507-20
https://support.apple.com/HT205219
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.