FKIE_CVE-2012-1151

Vulnerability from fkie_nvd - Published: 2012-09-09 21:55 - Updated: 2026-04-29 01:13
Severity ?
Summary
Multiple format string vulnerabilities in dbdimp.c in DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module before 2.19.0 for Perl allow remote PostgreSQL database servers to cause a denial of service (process crash) via format string specifiers in (1) a crafted database warning to the pg_warn function or (2) a crafted DBD statement to the dbd_st_prepare function.
References
secalert@redhat.comhttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=661536
secalert@redhat.comhttp://cpansearch.perl.org/src/TURNSTEP/DBD-Pg-2.19.1/Changes
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2012-1116.html
secalert@redhat.comhttp://secunia.com/advisories/48307Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/48319Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/48824
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-201204-08.xml
secalert@redhat.comhttp://www.debian.org/security/2012/dsa-2431
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2012:112
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2012/03/09/6
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2012/03/10/4
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=801733
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/73854
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/73855
secalert@redhat.comhttps://rt.cpan.org/Public/Bug/Display.html?id=75642
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=661536
af854a3a-2127-422b-91ae-364da2661108http://cpansearch.perl.org/src/TURNSTEP/DBD-Pg-2.19.1/Changes
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2012-1116.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48307Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48319Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48824
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201204-08.xml
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2012/dsa-2431
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2012:112
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/03/09/6
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/03/10/4
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=801733
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/73854
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/73855
af854a3a-2127-422b-91ae-364da2661108https://rt.cpan.org/Public/Bug/Display.html?id=75642
Impacted products
Vendor Product Version
perl perl *
perl perl 0.1
perl perl 0.2
perl perl 0.3
perl perl 0.4
perl perl 0.5
perl perl 0.52
perl perl 0.61
perl perl 0.62
perl perl 0.63
perl perl 0.64
perl perl 0.65
perl perl 0.66
perl perl 0.67
perl perl 0.68
perl perl 0.69
perl perl 0.70
perl perl 0.71
perl perl 0.72
perl perl 0.73
perl perl 0.80
perl perl 0.81
perl perl 0.82
perl perl 0.83
perl perl 0.84
perl perl 0.85
perl perl 0.86
perl perl 0.87
perl perl 0.88
perl perl 0.89
perl perl 0.90
perl perl 0.91
perl perl 0.92
perl perl 0.93
perl perl 0.94
perl perl 0.95
perl perl 0.96
perl perl 0.97
perl perl 0.98
perl perl 0.99
perl perl 1.00
perl perl 1.01
perl perl 1.20
perl perl 1.21
perl perl 1.22
perl perl 1.31
perl perl 1.32
perl perl 1.40
perl perl 1.41
perl perl 1.42
perl perl 1.43
perl perl 1.44
perl perl 1.45
perl perl 1.46
perl perl 1.47
perl perl 1.48
perl perl 1.49
perl perl 2.0.0
perl perl 2.1.0
perl perl 2.1.1
perl perl 2.1.2
perl perl 2.1.3
perl perl 2.2.0
perl perl 2.2.1
perl perl 2.2.2
perl perl 2.3.0
perl perl 2.4.0
perl perl 2.5.0
perl perl 2.5.1
perl perl 2.6.0
perl perl 2.6.1
perl perl 2.6.2
perl perl 2.6.3
perl perl 2.6.4
perl perl 2.6.5
perl perl 2.6.6
perl perl 2.7.0
perl perl 2.7.1
perl perl 2.7.2
perl perl 2.8.0
perl perl 2.8.1
perl perl 2.8.2
perl perl 2.8.3
perl perl 2.8.4
perl perl 2.8.5
perl perl 2.8.6
perl perl 2.8.7
perl perl 2.8.8
perl perl 2.9.0
perl perl 2.9.1
perl perl 2.9.2
perl perl 2.10.0
perl perl 2.10.1
perl perl 2.10.2
perl perl 2.10.3
perl perl 2.10.4
perl perl 2.10.5
perl perl 2.10.6
perl perl 2.10.7
perl perl 2.11.0
perl perl 2.11.1
perl perl 2.11.2
perl perl 2.11.3
perl perl 2.11.4
perl perl 2.11.5
perl perl 2.11.6
perl perl 2.11.7
perl perl 2.11.8
perl perl 2.12.0
perl perl 2.13.0
perl perl 2.14.0
perl perl 2.14.1
perl perl 2.15.0
perl perl 2.15.1
perl perl 2.16.0
perl perl 2.16.1
perl perl 2.17.0
perl perl 2.17.1
perl perl 2.17.2
perl perl 2.18.0

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "736230E6-7071-4650-8FB0-DD5624C9172C",
              "versionEndIncluding": "2.18.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1EF38B8-36B2-4F21-8F41-D0CDE28CDE43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE4F0BB5-7DB7-4CC6-83C5-D8C84DC2A863",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEC53956-98C5-4355-8670-9BB4A479BCC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FB8269B-270B-455F-94B1-0F1025041EE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3460B9A-89F5-4F3C-80DB-0DE6099D64E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "40C34F0C-B9A4-4AB4-8B34-44A65103DBBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "65434B07-D9FB-4D3A-B63C-48DA7ED603EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C634C91-BFD6-480A-ABC9-557066A11E1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92F2903-486A-4656-8E43-AF6D9E475A21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "47C86A61-CBDF-40A1-AC66-AB452C1C4FBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.65:*:*:*:*:*:*:*",
              "matchCriteriaId": "519DD527-BFE9-4166-A391-127FB8EDFA81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "66842472-632B-4505-B3E0-32C59AA73AA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "34774222-0D33-41F0-A917-09B044A53800",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.68:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E4C35D3-8169-41AA-8719-5E2D32DEF265",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.69:*:*:*:*:*:*:*",
              "matchCriteriaId": "2880F00C-B64E-4B69-9FFD-FFAF00E0EA31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "978875E8-61E6-43C8-8E1B-BAA9BFE696E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "45A9FB3A-ABF7-44E5-B3F3-C24E3FC2E440",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E2B3B94-DA75-44A8-B13B-004989615B4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "E758B292-C06F-4AF7-99B9-2BC49533C25A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "49F89A9B-4EAA-41A0-AEB6-16B7A7C13127",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "110AB146-D842-49AE-A6FB-15574D94F556",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "187FE6D6-7785-45C3-9FAF-C55AC370FD7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "F05B9866-08CD-4A32-8B59-4AA3818B2B5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.84:*:*:*:*:*:*:*",
              "matchCriteriaId": "C662A095-27AD-41B1-B92C-3352A68001DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.85:*:*:*:*:*:*:*",
              "matchCriteriaId": "890F038F-7668-4D67-8787-385145DE7F0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.86:*:*:*:*:*:*:*",
              "matchCriteriaId": "27C2A9DD-5A7D-489F-B2B2-BA2DD1FE5385",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.87:*:*:*:*:*:*:*",
              "matchCriteriaId": "98419B2D-7EF8-4F16-A95D-93D4C097F10A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.88:*:*:*:*:*:*:*",
              "matchCriteriaId": "F071074B-25A2-4ADA-AA51-DD5E07E44EE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.89:*:*:*:*:*:*:*",
              "matchCriteriaId": "3795B65D-4B65-419E-8ADC-8806BE12E0F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "17578EF4-677D-4C0D-AE02-0B59EDF19CE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "93DEF1EF-0286-4603-B9D8-05908189184A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A170ED4-8B94-4C09-A5D5-B6A9A5D04AF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.93:*:*:*:*:*:*:*",
              "matchCriteriaId": "0990BD24-ED47-44EF-962D-4737DD295D5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.94:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2B0D454-CD0E-4BF1-A516-A4A5E19A447D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.95:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D12BD17-3FBE-4917-9D44-4135FC857CBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.96:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF110E96-77E7-4BF9-9309-606E02871360",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.97:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C44DEA9-D1CC-4D6F-BFB4-F20BA8CBD837",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.98:*:*:*:*:*:*:*",
              "matchCriteriaId": "00ABCC48-9B7E-4312-8B64-44399409EDE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.99:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB8D8793-F072-4C7A-84B5-79EB6D0541BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DA44592-DC6D-4FB7-AC1D-A300643922C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:1.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EBE0151-85BA-449C-880F-E23D8C446D8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "83F3ED90-9586-41DB-9B83-C6B05C605213",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DB562AC-B665-4F2B-B004-9E848ACC7C20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "8305CB5A-A64A-4F11-B912-B2E428513E22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "367FF98C-12FF-4CEC-9870-6356FAD3C523",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "191EDFB5-F9AB-4A8B-BFC7-9BB7BCE7AAFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "A253AEB7-A581-4E1F-9410-E056390C0BC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "2696ACCA-47FC-4D25-8A08-17F7CD640040",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "50F9F981-903A-48F8-ACD9-48308E639261",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "99E7410D-A498-49FB-818E-309BDBDB7A21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "85BE0085-3E86-4A39-8AE4-76ED06D2534B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "2614B8FD-F7A5-4C70-AE1E-2255FCAB1154",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "58387159-A167-4032-9F3F-B517EF2185F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB414CE9-5EFA-45F7-BB0B-B8B3893444DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "93FBE9FB-99AC-4800-BB1F-4F0689E0A07A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:1.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFB83944-0183-4DDB-B20E-0C8A7646A07F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "80151ACD-28DC-4383-9B7E-F2B759299341",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C15294D-F2AC-4E81-A612-14A31510449D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF2EE2D3-A942-4CAE-8F14-213BB6CBD62A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "05630C5E-263A-4974-81A0-2DC178B9708C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B372AF6-29BB-4DAA-B3DA-3F8AE7BBC5BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C17CD4D0-DFE5-4C01-BEEA-891C865E18AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EEB7512-D7E2-4F24-B96F-4FFE9E650262",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "307F457C-4015-4857-ADB8-637BC53DEB54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B645F9A1-44FB-4504-BF6C-2810EE841025",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E91B29C4-3709-473E-8F69-69D77ECEB221",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB3068F9-9A65-4DC4-88C2-19C8E1807CED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADDA896A-8EA8-4924-A648-6001F83F8AB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "91611ED9-FFDE-42B2-8E02-5B089A34DB33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "638055BA-CB01-404E-B9CD-D9EEB284ACE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "54F33281-2EA9-49EF-A074-E0AE93D4DC72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EA4A6E5-F1A0-42E8-BB49-E06497DA582B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "085763C4-D71A-47AF-B64C-829E6EC8E6D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9805F52C-B9F4-4531-A478-C3FA03D1EA59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1183DBED-4EF7-4942-9400-D57BC0C63773",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FCE3D75-98D9-4D95-9EB9-F33E37CC047B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "58228B5F-7FA1-42B5-BC4A-A5F6535E2C39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7D4C885-1FDB-479C-9626-B006E1C84E0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6574874E-EE2A-43B0-9D4B-9106C46BF8AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "62A4C415-6408-4A7E-A1C9-8A327B0DEA59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B35E250-F525-4EF5-9DBD-D80D68E5C00E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "79388C94-3306-4FD2-880E-56D42830B822",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E181D243-AFF0-41E3-A969-3DC67E81E8A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D445C68D-BFB8-4BAB-B995-FADF7CA5DF2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8982A13-3F5E-4B52-932C-00BD7CEA7625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0518BBC-BE6F-4949-A39B-1BE1FFA9442D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D5F66A1-E3C6-4D89-B3E3-AF46CC98BB00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8090363F-1850-4095-A212-0A554EA37A3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FA77D7-CE3B-4ED2-8117-E6CC1BA39B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4687A27-D41C-489D-AA95-E6999ABB696D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C03AD0EA-BFB8-480D-9B9C-6D6BD0DABDB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "59BADDB6-D48A-4DC0-A758-902F0EBC51CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D12770F8-8729-4712-9023-64CB2B374BCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A7FD104-1DE9-4A2A-AB2B-CD4AD9E70A93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.10.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A33D85D8-AA73-4120-9DB0-85B9E0BC14F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.10.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "079B9B47-194A-4047-AFEB-ABAD9CA5E53E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.10.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "98034760-4DF2-4D7B-92D8-02EDCF56E618",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.10.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EB7B211-AFE1-4D1A-B46F-86394981D5D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "930C1B45-2ABE-42DD-8D10-B375ED796F4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5811AB6-ED08-40C9-A0CD-77793A495E81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "82185F66-9E19-4C56-8E77-5C153275A542",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.11.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E51FAC0-BEF4-4839-B3C0-CCC9ED015582",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.11.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D902DF16-5F3A-485E-9409-BC47A4E46014",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A8FA7E4-B406-4587-86A7-F560FE64A3B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.11.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "77C35F36-AD3C-418C-ACED-486FF06EFFC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.11.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "B28DF2CD-1BEC-4F5E-AD30-7F84E58DF223",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.11.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3960D793-C3C8-40FC-83B2-710ED2F5D658",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DDE4919-FA8A-485B-9F0E-BD015B1D4D8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC022C7A-35DD-445D-B9D3-6024CF28610E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "88D408D9-B90D-495A-BC09-E322FBE78E06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.14.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9D00E45-E017-43AB-AAF9-9B4721CD8E0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.15.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DDB7238-FD06-4872-A736-9D988A0433E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.15.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "676C7999-B586-40E0-83E8-EB09E3F107C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.16.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B80A50-5766-4ED7-9254-5CDDB74C7C04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.16.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAF88AD1-AECE-4227-AE63-EA3E279238C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.17.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8ED441D3-6D17-4F8E-AF0E-27D813B2C68F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.17.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "22CAAB68-FD86-49DB-8DA7-F16FC3F6B878",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.17.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DF19BA4-1BF5-4F1E-BE6C-318B581D1EB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.18.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6EE9535-B8AB-4DC8-A012-405FDEF88CA3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple format string vulnerabilities in dbdimp.c in DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module before 2.19.0 for Perl allow remote PostgreSQL database servers to cause a denial of service (process crash) via format string specifiers in (1) a crafted database warning to the pg_warn function or (2) a crafted DBD statement to the dbd_st_prepare function."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de formato de cadena en dbdimp.c en el m\u00f3dulo DBD::Pg (tambi\u00e9n conocido como DBD-Pg o libdbd-pg-perl) anteriores a c2.19.0 en Perl, permite a servidores remotos de bases de datos a provocar una denegaci\u00f3n de servicio (ca\u00edda de proceso) a trav\u00e9s de unos especificadores de formato de cadena en (1) una advertencia de la base de datos sobre la funci\u00f3n pg_warn o (2) una declaraci\u00f3n DBD manipulada  sobre la funci\u00f3n dbd_st_prepare."
    }
  ],
  "id": "CVE-2012-1151",
  "lastModified": "2026-04-29T01:13:23.040",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-09-09T21:55:05.213",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=661536"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://cpansearch.perl.org/src/TURNSTEP/DBD-Pg-2.19.1/Changes"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2012-1116.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48307"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48319"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/48824"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://security.gentoo.org/glsa/glsa-201204-08.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2012/dsa-2431"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:112"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/03/09/6"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/03/10/4"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=801733"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73854"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73855"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://rt.cpan.org/Public/Bug/Display.html?id=75642"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=661536"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://cpansearch.perl.org/src/TURNSTEP/DBD-Pg-2.19.1/Changes"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2012-1116.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48307"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48319"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48824"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201204-08.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2431"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:112"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/03/09/6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/03/10/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=801733"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73854"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73855"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://rt.cpan.org/Public/Bug/Display.html?id=75642"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-134"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…