[pkg-firebird-general] Bug#446373: CVE-2007-4992 stack based buffer overflow
Nico Golde
nion at debian.org
Fri Oct 12 15:16:39 UTC 2007
Package: firebird1.5
Severity: grave
Tags: security
Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for firebird1.5.
CVE-2007-4992[0]:
| Stack-based buffer overflow in the process_packet function in
| fbserver.exe in Firebird SQL 2.0.2 allows remote attackers to execute
| arbitrary code via a long request to TCP port 3050.
If you fix this vulnerability please also include the CVE id
in your changelog entry.
I had a look at remote/server.cpp, the vulnerable code is
the following:
3049: TEXT msg[128];
...
3064 if (string = port- port_user_name) {
3065 sprintf(msg,
3066 "SERVER/process_packet: connection rejected for %*.*s",
3067 string- str_length, string- str_length,
3068 string- str_data);
3069 gds__log(msg, 0);
For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4992
Kind regards
Nico
--
Nico Golde - http://ngolde.de - nion at jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : http://lists.alioth.debian.org/pipermail/pkg-firebird-general/attachments/20071012/e7a40ae1/attachment.pgp
More information about the pkg-firebird-general
mailing list