-
-
Notifications
You must be signed in to change notification settings - Fork 256
Closed
Description
Submitted by: Spencer McIntyre (zerosteiner)
Attachments:
bof.py
The FirebirdSQL server is vulnerable to a stack buffer overflow that can be
triggered when an unauthenticated user sends a specially crafted packet. The
result can lead to remote code execution as the user which runs the FirebirdSQL
server.
Proof of Concept and technical details:
https://gist.github.com/zeroSteiner/85daef257831d904479c
====== Test Details ======
Bug was fixed on 2.5.5.26952.
On 2.5.2.26540, 2.5.3.26780 and 2.5.4.26856 following lines appear in firebird.log after execution of this test:
\*\*\* DUMP \*\*\*
Tag=\-1 Offset=18 Length=34 Eof=0
Clump 5 at offset 0: AAAABBBBCCCCDDDD
Fatal exception during clumplet dump: Invalid clumplet buffer structure: buffer end before end of clumplet \- clumplet too long
Plain dump starting with offset 18: <05\><15\>localhost\.loca
===