Stack-based buffer overflow in Firebird 2.1.3 through 2.1.5 before 18514, and 2.5.1 through 2.5.3 before 26623, on Windows allows remote attackers to execute arbitrary code via a crafted packet to TCP port 3050, related to a missing size check during extraction of a group number from CNCT information.
{
"binaries": [
{
"binary_version": "2.5.2.26540.ds4-8ubuntu1",
"binary_name": "firebird-dev"
},
{
"binary_version": "2.5.2.26540.ds4-8ubuntu1",
"binary_name": "firebird2.5-classic"
},
{
"binary_version": "2.5.2.26540.ds4-8ubuntu1",
"binary_name": "firebird2.5-classic-common"
},
{
"binary_version": "2.5.2.26540.ds4-8ubuntu1",
"binary_name": "firebird2.5-classic-dbg"
},
{
"binary_version": "2.5.2.26540.ds4-8ubuntu1",
"binary_name": "firebird2.5-common"
},
{
"binary_version": "2.5.2.26540.ds4-8ubuntu1",
"binary_name": "firebird2.5-common-doc"
},
{
"binary_version": "2.5.2.26540.ds4-8ubuntu1",
"binary_name": "firebird2.5-doc"
},
{
"binary_version": "2.5.2.26540.ds4-8ubuntu1",
"binary_name": "firebird2.5-examples"
},
{
"binary_version": "2.5.2.26540.ds4-8ubuntu1",
"binary_name": "firebird2.5-server-common"
},
{
"binary_version": "2.5.2.26540.ds4-8ubuntu1",
"binary_name": "firebird2.5-super"
},
{
"binary_version": "2.5.2.26540.ds4-8ubuntu1",
"binary_name": "firebird2.5-super-dbg"
},
{
"binary_version": "2.5.2.26540.ds4-8ubuntu1",
"binary_name": "firebird2.5-superclassic"
},
{
"binary_version": "2.5.2.26540.ds4-8ubuntu1",
"binary_name": "libfbclient2"
},
{
"binary_version": "2.5.2.26540.ds4-8ubuntu1",
"binary_name": "libfbclient2-dbg"
},
{
"binary_version": "2.5.2.26540.ds4-8ubuntu1",
"binary_name": "libfbembed2.5"
},
{
"binary_version": "2.5.2.26540.ds4-8ubuntu1",
"binary_name": "libib-util"
}
],
"availability": "No subscription required"
}