ID CVE-2015-4054
Summary PgBouncer before 1.5.5 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by sending a password packet before a startup packet.
References
Vulnerable Configurations
  • cpe:2.3:a:pgbouncer:pgbouncer:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:pgbouncer:pgbouncer:1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:pgbouncer:pgbouncer:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:pgbouncer:pgbouncer:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:pgbouncer:pgbouncer:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:pgbouncer:pgbouncer:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:pgbouncer:pgbouncer:1.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:pgbouncer:pgbouncer:1.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:pgbouncer:pgbouncer:1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:pgbouncer:pgbouncer:1.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:pgbouncer:pgbouncer:1.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:pgbouncer:pgbouncer:1.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:pgbouncer:pgbouncer:1.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:pgbouncer:pgbouncer:1.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:pgbouncer:pgbouncer:1.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:pgbouncer:pgbouncer:1.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:pgbouncer:pgbouncer:1.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:pgbouncer:pgbouncer:1.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:pgbouncer:pgbouncer:1.1:*:*:*:*:*:*:*
    cpe:2.3:a:pgbouncer:pgbouncer:1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:pgbouncer:pgbouncer:1.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:pgbouncer:pgbouncer:1.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:pgbouncer:pgbouncer:1.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:pgbouncer:pgbouncer:1.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:pgbouncer:pgbouncer:1.2:-:*:*:*:*:*:*
    cpe:2.3:a:pgbouncer:pgbouncer:1.2:-:*:*:*:*:*:*
  • cpe:2.3:a:pgbouncer:pgbouncer:1.2:rc2:*:*:*:*:*:*
    cpe:2.3:a:pgbouncer:pgbouncer:1.2:rc2:*:*:*:*:*:*
  • cpe:2.3:a:pgbouncer:pgbouncer:1.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:pgbouncer:pgbouncer:1.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:pgbouncer:pgbouncer:1.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:pgbouncer:pgbouncer:1.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:pgbouncer:pgbouncer:1.3:rc1:*:*:*:*:*:*
    cpe:2.3:a:pgbouncer:pgbouncer:1.3:rc1:*:*:*:*:*:*
  • cpe:2.3:a:pgbouncer:pgbouncer:1.3.1:-:*:*:*:*:*:*
    cpe:2.3:a:pgbouncer:pgbouncer:1.3.1:-:*:*:*:*:*:*
  • cpe:2.3:a:pgbouncer:pgbouncer:1.3.1:rc1:*:*:*:*:*:*
    cpe:2.3:a:pgbouncer:pgbouncer:1.3.1:rc1:*:*:*:*:*:*
  • cpe:2.3:a:pgbouncer:pgbouncer:1.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:pgbouncer:pgbouncer:1.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:pgbouncer:pgbouncer:1.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:pgbouncer:pgbouncer:1.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:pgbouncer:pgbouncer:1.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:pgbouncer:pgbouncer:1.3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:pgbouncer:pgbouncer:1.4:-:*:*:*:*:*:*
    cpe:2.3:a:pgbouncer:pgbouncer:1.4:-:*:*:*:*:*:*
  • cpe:2.3:a:pgbouncer:pgbouncer:1.4:rc3:*:*:*:*:*:*
    cpe:2.3:a:pgbouncer:pgbouncer:1.4:rc3:*:*:*:*:*:*
  • cpe:2.3:a:pgbouncer:pgbouncer:1.4.1:-:*:*:*:*:*:*
    cpe:2.3:a:pgbouncer:pgbouncer:1.4.1:-:*:*:*:*:*:*
  • cpe:2.3:a:pgbouncer:pgbouncer:1.4.1:rc1:*:*:*:*:*:*
    cpe:2.3:a:pgbouncer:pgbouncer:1.4.1:rc1:*:*:*:*:*:*
  • cpe:2.3:a:pgbouncer:pgbouncer:1.4.1:rc2:*:*:*:*:*:*
    cpe:2.3:a:pgbouncer:pgbouncer:1.4.1:rc2:*:*:*:*:*:*
  • cpe:2.3:a:pgbouncer:pgbouncer:1.4.1:rc3:*:*:*:*:*:*
    cpe:2.3:a:pgbouncer:pgbouncer:1.4.1:rc3:*:*:*:*:*:*
  • cpe:2.3:a:pgbouncer:pgbouncer:1.4.1:rc4:*:*:*:*:*:*
    cpe:2.3:a:pgbouncer:pgbouncer:1.4.1:rc4:*:*:*:*:*:*
  • cpe:2.3:a:pgbouncer:pgbouncer:1.4.1:rc5:*:*:*:*:*:*
    cpe:2.3:a:pgbouncer:pgbouncer:1.4.1:rc5:*:*:*:*:*:*
  • cpe:2.3:a:pgbouncer:pgbouncer:1.4.2:-:*:*:*:*:*:*
    cpe:2.3:a:pgbouncer:pgbouncer:1.4.2:-:*:*:*:*:*:*
  • cpe:2.3:a:pgbouncer:pgbouncer:1.4.2:rc1:*:*:*:*:*:*
    cpe:2.3:a:pgbouncer:pgbouncer:1.4.2:rc1:*:*:*:*:*:*
  • cpe:2.3:a:pgbouncer:pgbouncer:1.5:-:*:*:*:*:*:*
    cpe:2.3:a:pgbouncer:pgbouncer:1.5:-:*:*:*:*:*:*
  • cpe:2.3:a:pgbouncer:pgbouncer:1.5:rc1:*:*:*:*:*:*
    cpe:2.3:a:pgbouncer:pgbouncer:1.5:rc1:*:*:*:*:*:*
  • cpe:2.3:a:pgbouncer:pgbouncer:1.5.1:-:*:*:*:*:*:*
    cpe:2.3:a:pgbouncer:pgbouncer:1.5.1:-:*:*:*:*:*:*
  • cpe:2.3:a:pgbouncer:pgbouncer:1.5.1:rc1:*:*:*:*:*:*
    cpe:2.3:a:pgbouncer:pgbouncer:1.5.1:rc1:*:*:*:*:*:*
  • cpe:2.3:a:pgbouncer:pgbouncer:1.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:pgbouncer:pgbouncer:1.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:pgbouncer:pgbouncer:1.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:pgbouncer:pgbouncer:1.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:pgbouncer:pgbouncer:1.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:pgbouncer:pgbouncer:1.5.4:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 03-11-2020 - 18:16)
Impact:
Exploitability:
CWE CWE-476
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
refmap via4
bid 74751
confirm
gentoo GLSA-201701-24
mlist [oss-security] 20150522 Re: CVE Request: pgbouncer: DoS/remote crash: invalid packet order causes lookup of NULL pointer
Last major update 03-11-2020 - 18:16
Published 23-05-2017 - 04:29
Last modified 03-11-2020 - 18:16
Back to Top