Page 2 of 31 results (0.014 seconds)

CVSS: 7.8EPSS: 92%CPEs: 4EXPL: 1

Integer overflow in Firebird SQL 1.0.3 and earlier, 1.5.x before 1.5.6, 2.0.x before 2.0.4, and 2.1.x before 2.1.0 RC1 might allow remote attackers to execute arbitrary code via crafted (1) op_receive, (2) op_start, (3) op_start_and_receive, (4) op_send, (5) op_start_and_send, and (6) op_start_send_and_receive XDR requests, which triggers memory corruption. Desbordamiento de entero en Firebird SQL 1.0.3 y versiones anteriores, 1.5.x versiones anteriores a 1.5.6, 2.0.x versiones anteriores a 2.0.4, y 2.1.x versiones anteriores a 2.1.0 RC1, podría permitir a atacantes remotos ejecutar código de su elección mediante peticiones manipuladas (1) op_receive, (2) op_start, (3) op_start_and_receive, (4) op_send, (5) op_start_and_send, y (6) op_start_send_and_receive XDR, que disparan corrupción de memoria. • https://www.exploit-db.com/exploits/31050 http://secunia.com/advisories/29203 http://secunia.com/advisories/29501 http://security.gentoo.org/glsa/glsa-200803-02.xml http://securityreason.com/securityalert/3580 http://sourceforge.net/project/shownotes.php?group_id=9028&release_id=570800 http://tracker.firebirdsql.org/browse/CORE-1681 http://www.coresecurity.com/?action=item&id=2095 http://www.debian.org/security/2008/dsa-1529 http://www.securityfocus.com/archive/1/487173/100 • CWE-189: Numeric Errors •

CVSS: 10.0EPSS: 38%CPEs: 1EXPL: 0

Stack-based buffer overflow in the process_packet function in fbserver.exe in Firebird SQL 2.0.2 allows remote attackers to execute arbitrary code via a long request to TCP port 3050. Desbordamiento de búfer basado en pila en la función process_packet de fbserver.exe en Firebird SQL 2.0.2 permite a atacantes remotos ejecutar código de su elección mediante una petición larga al puerto TCP 3050. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Firebird SQL server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the database service fbserver.exe, which binds to TCP port 3050. When processing an overly long request, a stack buffer can be overflowed through a vulnerable call to sprintf() within the function process_packet(). • http://bugs.gentoo.org/show_bug.cgi?id=195569 http://secunia.com/advisories/27982 http://security.gentoo.org/glsa/glsa-200712-06.xml http://securitytracker.com/id?1018802 http://www.firebirdsql.org/rlsnotes/Firebird-2.0.3-ReleaseNotes.pdf http://www.securityfocus.com/archive/1/482025/100/0/threaded http://www.securityfocus.com/bid/26011 http://www.zerodayinitiative.com/advisories/ZDI-07-057.html https://exchange.xforce.ibmcloud.com/vulnerabilities/37079 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 5%CPEs: 4EXPL: 3

Multiple stack-based buffer overflows in Firebird LI 1.5.3.4870 and 1.5.4.4910, and WI 1.5.3.4870 and 1.5.4.4910, allow remote attackers to execute arbitrary code via (1) a long service attach request on TCP port 3050 to the SVC_attach function or (2) unspecified vectors involving the INET_connect function. Múltiples desbordamientos de búfer en Firebird LI 1.5.3.4870 y 1.5.4.4910, y WI 1.5.3.4870 y 1.5.4.4910, permite a atacantes remotos ejecutar código de su elección a través de (1) una petición larga de fijación del servicio sobre TCP puerto 3050 en la función SVC_attach o (2) vectores no especificados afectando a la función INET_connect. • http://risesecurity.org/advisory/RISE-2007003 http://risesecurity.org/blog/entry/3 http://risesecurity.org/exploit/18 http://secunia.com/advisories/27066 http://secunia.com/advisories/28635 http://www.risesecurity.org/advisory/RISE-2007003 http://www.securityfocus.com/archive/1/481491/100/0/threaded http://www.securityfocus.com/bid/25917 http://www.securityfocus.com/bid/25925 http://www.securitytracker.com/id?1018773 http://www.vupen.com/english/advisories/2007/3380 https:& • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 29%CPEs: 4EXPL: 0

Multiple stack-based buffer overflows in Firebird LI 2.0.0.12748 and 2.0.1.12855, and WI 2.0.0.12748 and 2.0.1.12855, allow remote attackers to execute arbitrary code via (1) a long attach request on TCP port 3050 to the isc_attach_database function or (2) a long create request on TCP port 3050 to the isc_create_database function. Múltiples desbordamientos de búfer en FFirebird LI 2.0.0.12748 and 2.0.1.12855, and WI 2.0.0.12748 and 2.0.1.12855, permite a atacantes remotos ejecutar código de su elección a través de (1) una petición larga de fijación del servicio sobre TCP puerto 3050 en la función isc_attach_database o (2) petición de creación larga sobre el puerto 3050 TCP en la función isc_create_database. • http://bugs.gentoo.org/show_bug.cgi?id=195569 http://risesecurity.org/advisory/RISE-2007003 http://risesecurity.org/blog/entry/3 http://risesecurity.org/exploit/16 http://risesecurity.org/exploit/17 http://secunia.com/advisories/27057 http://secunia.com/advisories/27982 http://security.gentoo.org/glsa/glsa-200712-06.xml http://www.risesecurity.org/advisory/RISE-2007003 http://www.securityfocus.com/archive/1/481491/100/0/threaded http://www.securityfocus.com/bid/25917 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 9%CPEs: 1EXPL: 0

Unspecified vulnerability in the server in Firebird before 2.0.2 allows remote attackers to cause a denial of service (daemon crash) via an XNET session that makes multiple simultaneous requests to register events, aka CORE-1403. Vulnerabilidad no especificada en el servidor en Firebird anterior a 2.0.2 permite a atacantes remotos provocar denegación de servicio (caida de demonio) a través de una sesión XNET que realiza múltiples respuestas simultáneas para registrar eventos, también conocido como CORE-1403. • http://secunia.com/advisories/26615 http://secunia.com/advisories/29501 http://sourceforge.net/project/shownotes.php?release_id=535898 http://tracker.firebirdsql.org/browse/CORE-1403 http://www.debian.org/security/2008/dsa-1529 http://www.firebirdsql.org/index.php?op=files&id=engine_202 http://www.firebirdsql.org/rlsnotes/Firebird-2.0.2-ReleaseNotes.pdf http://www.securityfocus.com/bid/25497 http://www.vupen.com/english/advisories/2007/3021 https://exchange.xforce.ibmcloud.com&#x • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •