Impact
PostgreSQL fails to validate the length of multibyte characters used in text manipulation. A crafted query can overflow a buffer, allowing a database user to run code with the operating system permissions of the database service. The vulnerability enables the attacker to compromise confidentiality, integrity, and availability of the host system.
Affected Systems
Versions of PostgreSQL before 14.21, 15.16, 16.12, 17.8, and 18.2 are affected. Any installation using these releases is susceptible unless the database user account does not have access to construct the vulnerable queries.
Risk and Exploitability
The CVSS score of 8.8 classifies this issue as high severity, and the EPSS score of less than 1% indicates a low current exploitation probability. It is not listed in the CISA KEV catalogue. The most likely attack vector is through a crafted SQL statement sent over a database connection, either locally or remotely if the database is exposed to an untrusted network.
OpenCVE Enrichment
Debian DLA
Debian DSA