1. Symantec-Broadcom-Horizontal/
  2. Security Response/
  3. Attack Signatures/
  4. Attack: Firebird Database Attach CVE-2007-5243

Attack: Firebird Database Attach CVE-2007-5243

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.

Description

This signature detects attempts to exploit a buffer overflow vulnerability in Borland InterBase.

Additional Information

Borland InterBase is a scalable database application available for multiple operating platforms including Windows, Linux, and Solaris.

InterBase is prone to multiple remote buffer-overflow vulnerabilities because it fails to bounds-check user-supplied input before copying it into an insufficiently sized memory buffer.

These issues affect the following functions:

INET_connect
SVC_attach
isc_attach_database
jrd8_attach_database
isc_create_database
jrd8_create_database
PWD_db_aliased
expand_filename2
open_marker_file

Reports indicate that some of these functions are affected by multiple memory corruption vulnerabilities and up to twenty issues exist in the application.

Successfully exploiting these issues allows remote attackers to execute arbitrary machine code with SYSTEM-Level privileges. This will result in a complete compromise of affected computers.

Borland InterBase 2007 for Linux and Windows is considered to be vulnerable to these issues.

Some of these issues affect Firebird relational database, which is based on code from Borland Interbase. The following vulnerable functions were identified in Firebird :

INET_connect (Firebird 1.5)
SVC_attach (Firebird 1.5)
isc_attach_database (Firebird 2.0)
isc_create_database (Firebird 2.0)

Firebird versions 1.5.3, 1.5.4, 2.0.0, and 2.0.1 for Linux and Windows are affected by these issues.

Affected

  • Borland Interbase 2007, 2007 SP2
  • Firebird Firebird 1.5.3, 1.5.4, 2.0, 2.0.1

Response

Reports indicate that these issues have been addressed in the latest version of Firebird (Firebird 2.0.3.1298-1). Symantec was unable to verify this information and is not aware of any vendor-supplied patches for these issues. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com.
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube