Page 3 of 35 results (0.017 seconds)

CVSS: 10.0EPSS: 38%CPEs: 1EXPL: 0

Stack-based buffer overflow in the process_packet function in fbserver.exe in Firebird SQL 2.0.2 allows remote attackers to execute arbitrary code via a long request to TCP port 3050. Desbordamiento de búfer basado en pila en la función process_packet de fbserver.exe en Firebird SQL 2.0.2 permite a atacantes remotos ejecutar código de su elección mediante una petición larga al puerto TCP 3050. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Firebird SQL server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the database service fbserver.exe, which binds to TCP port 3050. When processing an overly long request, a stack buffer can be overflowed through a vulnerable call to sprintf() within the function process_packet(). • http://bugs.gentoo.org/show_bug.cgi?id=195569 http://secunia.com/advisories/27982 http://security.gentoo.org/glsa/glsa-200712-06.xml http://securitytracker.com/id?1018802 http://www.firebirdsql.org/rlsnotes/Firebird-2.0.3-ReleaseNotes.pdf http://www.securityfocus.com/archive/1/482025/100/0/threaded http://www.securityfocus.com/bid/26011 http://www.zerodayinitiative.com/advisories/ZDI-07-057.html https://exchange.xforce.ibmcloud.com/vulnerabilities/37079 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 5%CPEs: 4EXPL: 3

Multiple stack-based buffer overflows in Firebird LI 1.5.3.4870 and 1.5.4.4910, and WI 1.5.3.4870 and 1.5.4.4910, allow remote attackers to execute arbitrary code via (1) a long service attach request on TCP port 3050 to the SVC_attach function or (2) unspecified vectors involving the INET_connect function. Múltiples desbordamientos de búfer en Firebird LI 1.5.3.4870 y 1.5.4.4910, y WI 1.5.3.4870 y 1.5.4.4910, permite a atacantes remotos ejecutar código de su elección a través de (1) una petición larga de fijación del servicio sobre TCP puerto 3050 en la función SVC_attach o (2) vectores no especificados afectando a la función INET_connect. • http://risesecurity.org/advisory/RISE-2007003 http://risesecurity.org/blog/entry/3 http://risesecurity.org/exploit/18 http://secunia.com/advisories/27066 http://secunia.com/advisories/28635 http://www.risesecurity.org/advisory/RISE-2007003 http://www.securityfocus.com/archive/1/481491/100/0/threaded http://www.securityfocus.com/bid/25917 http://www.securityfocus.com/bid/25925 http://www.securitytracker.com/id?1018773 http://www.vupen.com/english/advisories/2007/3380 https:& • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 29%CPEs: 4EXPL: 0

Multiple stack-based buffer overflows in Firebird LI 2.0.0.12748 and 2.0.1.12855, and WI 2.0.0.12748 and 2.0.1.12855, allow remote attackers to execute arbitrary code via (1) a long attach request on TCP port 3050 to the isc_attach_database function or (2) a long create request on TCP port 3050 to the isc_create_database function. Múltiples desbordamientos de búfer en FFirebird LI 2.0.0.12748 and 2.0.1.12855, and WI 2.0.0.12748 and 2.0.1.12855, permite a atacantes remotos ejecutar código de su elección a través de (1) una petición larga de fijación del servicio sobre TCP puerto 3050 en la función isc_attach_database o (2) petición de creación larga sobre el puerto 3050 TCP en la función isc_create_database. • http://bugs.gentoo.org/show_bug.cgi?id=195569 http://risesecurity.org/advisory/RISE-2007003 http://risesecurity.org/blog/entry/3 http://risesecurity.org/exploit/16 http://risesecurity.org/exploit/17 http://secunia.com/advisories/27057 http://secunia.com/advisories/27982 http://security.gentoo.org/glsa/glsa-200712-06.xml http://www.risesecurity.org/advisory/RISE-2007003 http://www.securityfocus.com/archive/1/481491/100/0/threaded http://www.securityfocus.com/bid/25917 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 4.0EPSS: 0%CPEs: 1EXPL: 0

The Services API in Firebird before 2.0.2 allows remote authenticated users without SYSDBA privileges to read the server log (firebird.log), aka CORE-1148. La Services API del Firebird anterior al 2.0.2 permite a usuarios remotos autenticados sin privilegios SYSDBA leer el log del servidor (firebird.log), también conocido como CORE-1148. • http://secunia.com/advisories/29501 http://sourceforge.net/project/shownotes.php?release_id=535898 http://tracker.firebirdsql.org/browse/CORE-1148 http://www.debian.org/security/2008/dsa-1529 http://www.firebirdsql.org/index.php?op=files&id=engine_202 http://www.firebirdsql.org/rlsnotes/Firebird-2.0.2-ReleaseNotes.pdf http://www.securityfocus.com/bid/25497 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

Unspecified vulnerability in the (1) attach database and (2) create database functionality in Firebird before 2.0.2, when a filename exceeds MAX_PATH_LEN, has unknown impact and attack vectors, aka CORE-1405. Vulnerabilidad no especificada en la funcionalidad (1) adjuntar base de datos y (2) crear base de datos en Firebird versiones anteriores 2.0.2, cuando un nombre de fichero excede MAX_PATH_LEN, tiene impacto desconocido y vectores de ataque, también conocido como CORE-1405. • http://secunia.com/advisories/26615 http://secunia.com/advisories/29501 http://sourceforge.net/project/shownotes.php?release_id=535898 http://tracker.firebirdsql.org/browse/CORE-1405 http://www.debian.org/security/2008/dsa-1529 http://www.firebirdsql.org/index.php?op=files&id=engine_202 http://www.firebirdsql.org/rlsnotes/Firebird-2.0.2-ReleaseNotes.pdf http://www.securityfocus.com/bid/25497 http://www.vupen.com/english/advisories/2007/3021 https://exchange.xforce.ibmcloud.com&#x • CWE-20: Improper Input Validation CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •