|
|
|
|
| |
Credit:
The information has been provided by The Zero Day Initiative (ZDI).
The original article can be found at: http://www.zerodayinitiative.com/advisories/ZDI-07-057.html
|
| |
Vulnerable Systems:
* Firebird SQL version 2.0.2
Immune Systems:
* Firebird SQL version 2.0.3
The specific flaw exists within the database service fbserver.exe, which binds to TCP port 3050. When processing an overly long request, a stack buffer can be overflowed through a vulnerable call to sprintf() within the function process_packet(). If properly exploited, remote control of the affected system can be attained with SYSTEM credentials.
Vendor Response:
Firebird has issued an update to correct this vulnerability. More details can be found at: http://www.firebirdsql.org/rlsnotes/Firebird-2.0.3-ReleaseNotes.pdf
Disclosure Timeline:
2007.09.14 - Vulnerability reported to vendor
2007.10.09 - Digital Vaccine released to TippingPoint customers
2007.10.10 - Coordinated public release of advisory
CVE Information:
CVE-2007-4992
|
|
|
|
|