Gentoo Logo

Buffer Overflow in Firebird

Content:

1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200405-18 / firebird
Release Date May 23, 2004
Latest Revision May 22, 2006: 02
Impact high
Exploitable local
Package Vulnerable versions Unaffected versions Architecture(s)
dev-db/firebird < 1.5 >= 1.5 All supported architectures

Related bugreports: #20837

Synopsis

A buffer overflow via environmental variables in Firebird may allow a local user to manipulate or destroy local databases and trojan the Firebird binaries.

2.  Impact Information

Background

Firebird is an open source relational database that runs on Linux, Windows, and various UNIX systems.

Description

A buffer overflow exists in three Firebird binaries (gds_inet_server, gds_lock_mgr, and gds_drop) that is exploitable by setting a large value to the INTERBASE environment variable.

Impact

An attacker could control program execution, allowing privilege escalation to the UID of Firebird, full access to Firebird databases, and trojaning the Firebird binaries. An attacker could use this to compromise other user or root accounts.

3.  Resolution Information

Workaround

There is no known workaround.

Resolution

All users should upgrade to the latest version of Firebird:

Code Listing 3.1: Resolution

# emerge sync

# emerge -pv ">=dev-db/firebird-1.5"
# emerge ">=dev-db/firebird-1.5"

4.  References



Print

Page updated May 23, 2004

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2014 Gentoo Foundation, Inc. Questions, Comments? Contact us.