CVE-2016-0773

Source
https://nvd.nist.gov/vuln/detail/CVE-2016-0773
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-0773.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2016-0773
Related
Published
2016-02-17T15:59:02Z
Modified
2024-09-03T00:57:13.137800Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

PostgreSQL before 9.1.20, 9.2.x before 9.2.15, 9.3.x before 9.3.11, 9.4.x before 9.4.6, and 9.5.x before 9.5.1 allows remote attackers to cause a denial of service (infinite loop or buffer overflow and crash) via a large Unicode character range in a regular expression.

References

Affected packages

Git / git.postgresql.org/git/postgresql.git

Affected ranges

Type
GIT
Repo
https://git.postgresql.org/git/postgresql.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
3f7928a2890b05908e7c1ef711d48e609c86982e
Last affected
51dac56ad5fd4cf5fe90f59c4b40f967fc3b13c5
Last affected
582eff507eb3e3acae8c7d2d562ac2beb00b344f
Last affected
6237fadcc95bdcadd760f893d7bd9b866fadfff3
Last affected
69157086413efb8c1de793aa4493187c819cc5ae
Last affected
73c122769ca1f49c451e315d476c80fdcf9f20cc
Last affected
7800229b36d0444cf2c61f5c5895108ee5e8ee2a
Last affected
7c055f3ec3bd338a1ebb8c73cff3d01df626471e
Last affected
8b47c9d413b10a482b21aa9aad9d4f8569de8798
Last affected
8ca336f4ac3f08a5f23e76c6e9a5f2c8064f5883
Last affected
9f20f2fc43f7dbe5a60958bc41f24130957560a3
Last affected
a20751ef44b47034e8082a14d42b876b169e8713
Last affected
baf379bf22a9b4fd9caa4cf95de397cac480cceb
Last affected
bd9c6dc9ab9de8f07647015af65d6d2cec0057e3
Last affected
cdd4ed5449bf317cc71b45a8deee0173822e7592
Last affected
d0f83327d3739a45102fdd486947248c70e0249d
Last affected
d25c7d70ff46d1b2f2400f29d100190efe84d70d
Last affected
de17fe43fa2d67a9d93bd70979a4744ea98fb076
Last affected
e0327d103013c41c83f41a05187b90956b38c5b7
Last affected
e1ea61a30121a97eee192adc0808635fcf7b6f25
Last affected
ef47adb414e46099155c34529a2a5caeea02fc41
Last affected
f07692e1906c5f78d4dc4f777ade31cbfdb0069e
Last affected
f0ceb25d04da0b672e16efd20fa30641b78ffe63

Affected versions

Other

PG95-1_01
REL6_1
REL6_1_1
REL6_2
REL6_2_1
REL6_3
REL6_3_2
REL6_5
REL7_0
REL7_1
REL7_1_BETA
REL7_1_BETA2
REL7_1_BETA3
REL7_2
REL7_2_BETA1
REL7_2_BETA2
REL7_2_BETA3
REL7_2_BETA4
REL7_2_BETA5
REL7_2_RC1
REL7_2_RC2
REL7_4_BETA1
REL7_4_BETA2
REL7_4_BETA3
REL7_4_BETA4
REL7_4_BETA5
REL7_4_RC1
REL8_0_0
REL8_0_0BETA1
REL8_0_0BETA2
REL8_0_0BETA3
REL8_0_0BETA4
REL8_0_0BETA5
REL8_0_0RC1
REL8_0_0RC2
REL8_0_0RC3
REL8_0_0RC4
REL8_0_0RC5
REL8_1_0
REL8_1_0BETA1
REL8_1_0BETA2
REL8_1_0BETA3
REL8_1_0BETA4
REL8_1_0RC1
REL8_2_0
REL8_2_BETA1
REL8_2_BETA2
REL8_2_BETA3
REL8_2_RC1
REL8_3_0
REL8_3_BETA1
REL8_3_BETA2
REL8_3_BETA3
REL8_3_BETA4
REL8_3_RC1
REL8_3_RC2
REL8_4_0
REL8_4_BETA1
REL8_4_BETA2
REL8_4_RC1
REL8_4_RC2
REL9_0_ALPHA5
REL9_0_BETA1
REL9_0_BETA2
REL9_0_BETA3
REL9_1_0
REL9_1_1
REL9_1_10
REL9_1_11
REL9_1_12
REL9_1_13
REL9_1_14
REL9_1_15
REL9_1_16
REL9_1_17
REL9_1_18
REL9_1_19
REL9_1_2
REL9_1_3
REL9_1_4
REL9_1_5
REL9_1_6
REL9_1_7
REL9_1_8
REL9_1_9
REL9_1_ALPHA1
REL9_1_ALPHA2
REL9_1_ALPHA3
REL9_1_ALPHA4
REL9_1_ALPHA5
REL9_1_BETA1
REL9_1_BETA2
REL9_1_BETA3
REL9_1_RC1
REL9_2_0
REL9_2_1
REL9_2_10
REL9_2_11
REL9_2_12
REL9_2_2
REL9_2_3
REL9_2_4
REL9_2_5
REL9_2_6
REL9_2_7
REL9_2_8
REL9_2_9
REL9_2_BETA1
REL9_2_BETA2
REL9_2_BETA3
REL9_2_BETA4
REL9_2_RC1
REL9_3_BETA1
REL9_4_0
REL9_4_1
REL9_4_2
REL9_4_3
REL9_4_4
REL9_4_BETA1
REL9_4_BETA2
REL9_4_BETA3
REL9_4_RC1
REL9_5_0
REL9_5_ALPHA1
REL9_5_ALPHA2
REL9_5_BETA1
REL9_5_BETA2
REL9_5_RC1
Release_1_0_2
Release_2_0
Release_2_0_0
release-6-3