5 results (0.004 seconds)

CVSS: 9.3EPSS: 47%CPEs: 17EXPL: 16

Multiple stack-based buffer overflows in Borland InterBase LI 8.0.0.53 through 8.1.0.253, and WI 5.1.1.680 through 8.1.0.257, allow remote attackers to execute arbitrary code via (1) a long service attach request on TCP port 3050 to the (a) SVC_attach or (b) INET_connect function, (2) a long create request on TCP port 3050 to the (c) isc_create_database or (d) jrd8_create_database function, (3) a long attach request on TCP port 3050 to the (e) isc_attach_database or (f) PWD_db_aliased function, or unspecified vectors involving the (4) jrd8_attach_database or (5) expand_filename2 function. Múltiples desbordamientos de búfer basados en pila en Borland InterBase LI 8.0.0.53 hasta 8.1.0.253, y WI 5.1.1.680 hasta 8.1.0.257, permite a atacantes remotos ejecutar código de su elección mediante (1) una petición larga de anexión a servicio en el puerto TCP 3050 a las funciones (a) SVC_attach o (b) INET_connect, (2) una petición larga de creación en el puerto TCP 3050 a las funciones (c) isc_create_database o (d) jrd8_create_database, (3) una petición de anexión larga en el puerto TCP 3050 a las funciones (e) isc_attach_database o (f) PWD_db_aliased, o vectores no especificados que involucran a las funciones (4) jrd8_attach_database o (5) expand_filename2. • https://www.exploit-db.com/exploits/16843 https://www.exploit-db.com/exploits/16844 https://www.exploit-db.com/exploits/10020 https://www.exploit-db.com/exploits/16839 https://www.exploit-db.com/exploits/10021 https://www.exploit-db.com/exploits/9954 https://www.exploit-db.com/exploits/16437 https://www.exploit-db.com/exploits/16447 https://www.exploit-db.com/exploits/16449 https://www.exploit-db.com/exploits/16440 https://www.exploit-db.com/exploits/16432 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 23%CPEs: 9EXPL: 4

Buffer overflow in ibserver for Firebird Database 1.0 and other versions before 1.5, and possibly other products that use the InterBase codebase, allows remote attackers to cause a denial of service (crash) via a long database name, as demonstrated using the gsec command. • https://www.exploit-db.com/exploits/303 https://www.exploit-db.com/exploits/24165 http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0027.html http://marc.info/?l=bugtraq&m=108611386202493&w=2 http://secunia.com/advisories/11756 http://secunia.com/advisories/19350 http://securitytracker.com/id?1010381 http://www.debian.org/security/2006/dsa-1014 http://www.osvdb.org/6408 http://www.osvdb.org/6624 http://www.securiteam.com/unixfocus/5AP0P0UCUO.html http:& •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 2

The admin.ib file in Borland Interbase 7.1 for Linux has default world writable permissions, which allows local users to gain database administrative privileges. • http://secunia.com/advisories/11172 http://securitytracker.com/id?1009500 http://www.idefense.com/application/poi/display?id=80&type=vulnerabilities&flashstatus=true http://www.osvdb.org/4381 http://www.securityfocus.com/bid/9929 https://exchange.xforce.ibmcloud.com/vulnerabilities/15546 •

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 1

Buffer overflow gds_lock_mgr of Interbase Database 6.x allows local users to gain privileges via a long ISC_LOCK_ENV environment variable (INTERBASE_LOCK). Desbordamiento de búfer gds_lock_mgr de Interbase Database 6.x permite a usuarios locales la obtención de privilegios mediante una variable de entorno ISC_LOCK_ENV larga. (INTERBASE_LOCK). • http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0003.html http://marc.info/?l=bugtraq&m=104940730819887&w=2 http://www.secnetops.com/research/advisories/SRT2003-04-03-1300.txt •

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 3

gds_lock_mgr in Borland InterBase allows local users to overwrite files and gain privileges via a symlink attack on a "isc_init1.X" temporary file, as demonstrated by modifying the xinetdbd file. • https://www.exploit-db.com/exploits/21865 http://archives.neohapsis.com/archives/bugtraq/2002-09/0311.html http://www.iss.net/security_center/static/10196.php http://www.securityfocus.com/bid/5805 •