Gentoo Logo

Buffer Overflow in Firebird


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200405-18 / firebird
Release Date May 23, 2004
Latest Revision May 22, 2006: 02
Impact high
Exploitable local
Package Vulnerable versions Unaffected versions Architecture(s)
dev-db/firebird < 1.5 >= 1.5 All supported architectures

Related bugreports: #20837


A buffer overflow via environmental variables in Firebird may allow a local user to manipulate or destroy local databases and trojan the Firebird binaries.

2.  Impact Information


Firebird is an open source relational database that runs on Linux, Windows, and various UNIX systems.


A buffer overflow exists in three Firebird binaries (gds_inet_server, gds_lock_mgr, and gds_drop) that is exploitable by setting a large value to the INTERBASE environment variable.


An attacker could control program execution, allowing privilege escalation to the UID of Firebird, full access to Firebird databases, and trojaning the Firebird binaries. An attacker could use this to compromise other user or root accounts.

3.  Resolution Information


There is no known workaround.


All users should upgrade to the latest version of Firebird:

Code Listing 3.1: Resolution

# emerge sync

# emerge -pv ">=dev-db/firebird-1.5"
# emerge ">=dev-db/firebird-1.5"

4.  References


Page updated May 23, 2004

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.