Lucene search

K
gentooGentoo FoundationGLSA-201512-11
HistoryDec 30, 2015 - 12:00 a.m.

Firebird: Buffer Overflow

2015-12-3000:00:00
Gentoo Foundation
security.gentoo.org
11

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.761 High

EPSS

Percentile

98.2%

Background

Firebird is a multi-platform, open source relational database.

Description

The vulnerability is caused due to an error when processing requests from remote clients.

Impact

A remote attacker could possibly execute arbitrary code with the privileges of the process, or cause a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All Firebird users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose
 ">=dev-db/firebird-2.5.3.26780.0-r3"

NOTE: Firebird package was moved to the testing branch (unstable) of Gentoo. There is currently no stable version of Firebird, and there will be no further GLSAs for this package.

OSVersionArchitecturePackageVersionFilename
Gentooanyalldev-db/firebird< 2.5.3.26780.0-r3UNKNOWN

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.761 High

EPSS

Percentile

98.2%