Some vulnerabilities have been reported in Firebird, where some have unknown impact and others can be exploited by malicious users to disclose potentially sensitive information or to cause a DoS (Denial of Service).
1) An error exists in the processing of event registration requests. This can potentially be exploited by a client application connected via XNET to crash the Firebird server by registering several events in parallel.
2) An error exists in the processing of network packets. This can potentially be exploited to increase the CPU load to a high value and consume large amounts of memory by sending large network packets containing garbage data.
3) An unspecified error exists in the processing of Service API calls. This can be exploited to cause a DoS on the affected Firebird server.
4) An unspecified vulnerability with unknown impact exists in the processing of "attach database" and "create database" commands when the passed filename is larger than "MAX_PATH_LEN".
5) It is possible for a user without SYSDBA privileges to read the server log.
The vulnerabilities are reported in versions prior to 2.0.2.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Subject: Firebird Multiple Vulnerabilities
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.