Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200405-18] Buffer Overflow in Firebird

Vulnerability Assessment Details

[GLSA-200405-18] Buffer Overflow in Firebird

Vulnerability Assessment Summary
Buffer Overflow in Firebird

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200405-18
(Buffer Overflow in Firebird)

A buffer overflow exists in three Firebird binaries (gds_inet_server,
gds_lock_mgr, and gds_drop) that is exploitable by setting a large value to
the INTERBASE environment variable.


A possible hacker could control program execution, permiting privilege escalation
to the UID of Firebird, full access to Firebird databases, and trojaning
the Firebird binaries. A possible hacker could use this to compromise other user
or root accounts.


There is no known workaround.


All users should upgrade to the latest version of Firebird:
# emerge sync
# emerge -pv ">=dev-db/firebird-1.5"
# emerge ">=dev-db/firebird-1.5"

Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: (C) 2005 Michel Arboi

Cables, Connectors

Lenovo ThinkPad E560 15.6" DC-IN Jack Power Button USB Board W/Cables NS-A561
Lenovo ThinkPad E560 15.6OEM Bottom Case Cover 60.4L201.001 for Lenovo IdeaPad S510P
OEM Bottom Case Cover 60.4L201.001 for Lenovo IdeaPad S510P pictureLenovo ThinkPad T460 20FN002SUS 14" HD Display i5-6200U 2.3GHz 4GB RAM 500GB HDD
Lenovo ThinkPad T460 20FN002SUS 14


No Discussions have been posted on this vulnerability.