Integer overflow in Firebird SQL 1.0.3 and earlier, 1.5.x before 1.5.6, 2.0.x before 2.0.4, and 2.1.x before 2.1.0 RC1 might allow remote attackers to execute arbitrary code via crafted (1) op_receive, (2) op_start, (3) op_start_and_receive, (4) op_send, (5) op_start_and_send, and (6) op_start_send_and_receive XDR requests, which triggers memory corruption.
References
Link | Resource |
---|---|
http://www.coresecurity.com/?action=item&id=2095 | Third Party Advisory |
http://tracker.firebirdsql.org/browse/CORE-1681 | Vendor Advisory |
http://www.securityfocus.com/bid/27403 | Third Party Advisory VDB Entry |
http://sourceforge.net/project/shownotes.php?group_id=9028&release_id=570800 | Third Party Advisory |
http://security.gentoo.org/glsa/glsa-200803-02.xml | Third Party Advisory |
http://secunia.com/advisories/29203 | Third Party Advisory |
http://www.debian.org/security/2008/dsa-1529 | Third Party Advisory |
http://secunia.com/advisories/29501 | Third Party Advisory |
http://securityreason.com/securityalert/3580 | Third Party Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/39996 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/archive/1/487173/100/0/threaded | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Information
Published : 2008-01-28 18:00
Updated : 2018-10-26 07:19
NVD link : CVE-2008-0387
Mitre link : CVE-2008-0387
JSON object : View
CWE
CWE-189
Numeric Errors
Products Affected
firebirdsql
- firebird