[pkg-firebird-general] Bug#446373: CVE-2007-4992 stack based buffer overflow

Nico Golde nion at debian.org
Fri Oct 12 15:16:39 UTC 2007


Package: firebird1.5
Severity: grave
Tags: security

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for firebird1.5.

CVE-2007-4992[0]:
| Stack-based buffer overflow in the process_packet function in
| fbserver.exe in Firebird SQL 2.0.2 allows remote attackers to execute
| arbitrary code via a long request to TCP port 3050.

If you fix this vulnerability please also include the CVE id
in your changelog entry.

I had a look at remote/server.cpp, the vulnerable code is
the following:
3049: TEXT msg[128];
...
3064 if (string = port-  port_user_name) {
3065     sprintf(msg,
3066         "SERVER/process_packet: connection rejected for %*.*s",
3067         string-  str_length, string-  str_length,
3068         string-  str_data);
3069     gds__log(msg, 0);

For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4992

Kind regards
Nico

-- 
Nico Golde - http://ngolde.de - nion at jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : http://lists.alioth.debian.org/pipermail/pkg-firebird-general/attachments/20071012/e7a40ae1/attachment.pgp 


More information about the pkg-firebird-general mailing list