{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-10977","assignerOrgId":"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007","state":"PUBLISHED","assignerShortName":"PostgreSQL","dateReserved":"2024-11-07T19:27:03.261Z","datePublished":"2024-11-14T13:00:05.715Z","dateUpdated":"2025-11-03T21:51:38.414Z"},"containers":{"cna":{"providerMetadata":{"orgId":"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007","shortName":"PostgreSQL","dateUpdated":"2024-11-14T13:00:05.715Z"},"title":"PostgreSQL libpq retains an error message from man-in-the-middle","descriptions":[{"lang":"en","value":"Client use of server error message in PostgreSQL allows a server not trusted under current SSL or GSS settings to furnish arbitrary non-NUL bytes to the libpq application.  For example, a man-in-the-middle attacker could send a long error message that a human or screen-scraper user of psql mistakes for valid query results.  This is probably not a concern for clients where the user interface unambiguously indicates the boundary between one error message and other text.  Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected."}],"affected":[{"defaultStatus":"unaffected","product":"PostgreSQL","vendor":"n/a","versions":[{"lessThan":"17.1","status":"affected","version":"17","versionType":"rpm"},{"lessThan":"16.5","status":"affected","version":"16","versionType":"rpm"},{"lessThan":"15.9","status":"affected","version":"15","versionType":"rpm"},{"lessThan":"14.14","status":"affected","version":"14","versionType":"rpm"},{"lessThan":"13.17","status":"affected","version":"13","versionType":"rpm"},{"lessThan":"12.21","status":"affected","version":"0","versionType":"rpm"}]}],"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-348","type":"CWE","description":"Use of Less Trusted Source"}]}],"references":[{"url":"https://www.postgresql.org/support/security/CVE-2024-10977/"}],"metrics":[{"format":"CVSS","cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N","baseScore":3.1,"baseSeverity":"LOW"}}],"credits":[{"lang":"en","value":"The PostgreSQL project thanks Jacob Champion for reporting this problem."}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-14T18:53:39.616679Z","id":"CVE-2024-10977","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-14T19:31:59.396Z"}},{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2024/11/msg00011.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T21:51:38.414Z"}}]}}