| Vulnerability Name: | CVE-2017-18359 (CCN-156128) | ||||||||||||||||||||||||||||||||||||
| Assigned: | 2019-01-24 | ||||||||||||||||||||||||||||||||||||
| Published: | 2019-01-24 | ||||||||||||||||||||||||||||||||||||
| Updated: | 2022-04-06 | ||||||||||||||||||||||||||||||||||||
| Summary: | PostGIS 2.x before 2.3.3, as used with PostgreSQL, allows remote attackers to cause a denial of service via crafted ST_AsX3D function input, as demonstrated by an abnormal server termination for "SELECT ST_AsX3D('LINESTRING EMPTY');" because empty geometries are mishandled. | ||||||||||||||||||||||||||||||||||||
| CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||
| CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||||||||||||||||||||||||||||||
| Vulnerability Type: | CWE-20 | ||||||||||||||||||||||||||||||||||||
| Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2017-18359 Source: XF Type: UNKNOWN postgis-cve201718359-dos(156128) Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20190131 [SECURITY] [DLA 1653-1] postgis security update Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20211227 [SECURITY] [DLA 2857-1] postgis security update Source: MISC Type: Patch, Third Party Advisory https://trac.osgeo.org/postgis/changeset/15444 Source: MISC Type: Patch, Third Party Advisory https://trac.osgeo.org/postgis/changeset/15445 Source: CCN Type: PostGIS #3704 ST_AsX3D returns random data / crashes client Source: MISC Type: Exploit, Third Party Advisory https://trac.osgeo.org/postgis/ticket/3704 Source: CCN Type: WhiteSource Vulnerability Database CVE-2017-18359 | ||||||||||||||||||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
| BACK | |||||||||||||||||||||||||||||||||||||