VYPR
Unrated severityNVD Advisory· Published Dec 10, 2023· Updated Mar 11, 2026

Postgresql: buffer overrun from integer overflow in array modification

CVE-2023-5869

Description

A flaw was found in PostgreSQL that allows authenticated database users to execute arbitrary code through missing overflow checks during SQL array value modification. This issue exists due to an integer overflow during array modification where a remote user can trigger the overflow by providing specially crafted data. This enables the execution of arbitrary code on the target system, allowing users to write arbitrary bytes to memory and extensively read the server's memory.

Affected products

19
  • Red Hat/Red Hat Enterprise Linux 8v52 versions
    cpe:/a:redhat:enterprise_linux:8::appstream+ 1 more
    • cpe:/a:redhat:enterprise_linux:8::appstreamrange: 8090020231114113548.a75119d5
    • cpe:/o:redhat:enterprise_linux:8
  • Red Hat/Red Hat Enterprise Linux 8.1 Update Services for SAP Solutionsv5
    cpe:/a:redhat:rhel_e4s:8.1::appstream
    Range: 8010020231130170510.c27ad7f8
  • Red Hat/Red Hat Enterprise Linux 8.8 Extended Update Supportv5
    cpe:/a:redhat:rhel_eus:8.8::appstream
    Range: 8080020231113134015.63b34585
  • Red Hat/Red Hat Enterprise Linux 9v53 versions
    cpe:/a:redhat:enterprise_linux:9::crb+ 2 more
    • cpe:/a:redhat:enterprise_linux:9::crbrange: 0:13.13-1.el9_3
    • cpe:/a:redhat:enterprise_linux:9::appstreamrange: 9030020231120082734.rhel9
    • cpe:/o:redhat:enterprise_linux:9
  • Red Hat/Red Hat Enterprise Linux 8.4 Update Services for SAP Solutionsv5
    cpe:/a:redhat:rhel_e4s:8.4::appstream
    Range: 8040020231127142440.522a0ee4
  • Red Hat/Red Hat Enterprise Linux 8.2 Update Services for SAP Solutionsv5
    cpe:/a:redhat:rhel_e4s:8.2::appstream
    Range: 8020020231201202149.4cda2c84
  • Red Hat/Red Hat Advanced Cluster Security 4.2v5
    cpe:/a:redhat:advanced_cluster_security:4.2::el8
    Range: 4.2.4-7
  • Red Hat/Red Hat Enterprise Linux 7v5
    cpe:/o:redhat:enterprise_linux:7::server
    Range: 0:9.2.24-9.el7_9
  • Red Hat/Red Hat Enterprise Linux 9.0 Extended Update Supportv5
    cpe:/a:redhat:rhel_eus:9.0::appstream
    Range: 0:13.13-1.el9_0
  • Red Hat/Red Hat Enterprise Linux 8.6 Extended Update Supportv5
    cpe:/a:redhat:rhel_eus:8.6::appstream
    Range: 8060020231201202249.ad008a3a
  • Red Hat/Red Hat Enterprise Linux 9.2 Extended Update Supportv52 versions
    cpe:/a:redhat:rhel_eus:9.2::crb+ 1 more
    • cpe:/a:redhat:rhel_eus:9.2::crbrange: 0:13.13-1.el9_2
    • cpe:/a:redhat:rhel_eus:9.2::appstreamrange: 9020020231115020618.rhel9
  • Red Hat/Red Hat Software Collections for Red Hat Enterprise Linux 7v5
    cpe:/a:redhat:rhel_software_collections:3::el7
    Range: 0:13.13-1.el7
  • Red Hat/RHACS-3.74-RHEL-8v5
    cpe:/a:redhat:advanced_cluster_security:3.74::el8
    Range: 3.74.8-9
  • Red Hat/RHACS-4.1-RHEL-8v5
    cpe:/a:redhat:advanced_cluster_security:4.1::el8
    Range: 4.1.6-6
  • Red Hat/Red Hat Enterprise Linux 6v5
    cpe:/o:redhat:enterprise_linux:6

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

33

News mentions

1