GLSA Bodhisattva
Joined: 13 Jun 2003 Posts: 4087 Location: Dresden, Germany
|
Posted: Sun May 23, 2004 12:17 pm Post subject: [ GLSA 200405-18 ] Buffer Overflow in Firebird |
|
|
Gentoo Linux Security Advisory
Title: Buffer Overflow in Firebird (GLSA 200405-18)
Severity: high
Exploitable: local
Date: May 23, 2004
Updated: May 22, 2006
Bug(s): #20837
ID: 200405-18
Synopsis
A buffer overflow via environmental variables in Firebird may allow a local
user to manipulate or destroy local databases and trojan the Firebird
binaries.
Background
Firebird is an open source relational database that runs on Linux,
Windows, and various UNIX systems.
Affected Packages
Package: dev-db/firebird
Vulnerable: < 1.5
Unaffected: >= 1.5
Architectures: All supported architectures
Description
A buffer overflow exists in three Firebird binaries (gds_inet_server,
gds_lock_mgr, and gds_drop) that is exploitable by setting a large
value to the INTERBASE environment variable.
Impact
An attacker could control program execution, allowing privilege
escalation to the UID of Firebird, full access to Firebird databases,
and trojaning the Firebird binaries. An attacker could use this to
compromise other user or root accounts.
Workaround
There is no known workaround.
Resolution
All users should upgrade to the latest version of Firebird:
Code: | # emerge sync
# emerge -pv ">=dev-db/firebird-1.5"
# emerge ">=dev-db/firebird-1.5" |
References
Bugtraq Security Announcement
[url= http://sourceforge.net/tracker/?group_id=9028&atid=109028&func=detail&aid=739480]Sourceforge BugTracker Announcement[/url]
CVE-2003-0281
Last edited by GLSA on Tue Jul 15, 2014 4:16 am; edited 4 times in total |
|