>
> TITLE:
> Firebird "connect" Request Handling Buffer Overflow Vulnerability
>
> SECUNIA ADVISORY ID:
> SA25601
>
> VERIFY ADVISORY:
> http://secunia.com/advisories/25601/
>
> CRITICAL:
> Moderately critical
>
> IMPACT:
> System access
>
> WHERE:
> From local network
>
> SOFTWARE:
> Firebird 2.x
> http://secunia.com/product/11516/
>
> DESCRIPTION:
> Cody Pierce has reported a vulnerability in Firebird, which can be
> exploited by malicious people to compromise a vulnerable system.
>
> The vulnerability is caused due to an error within the handling of
> "connect" requests (0x1) with a large "p_cnct_count" value. This can
> be exploited to cause a buffer overflow by sending a specially
> crafted connect request to a vulnerable server (default port
> 3050/TCP).
>
> The vulnerability is reported in Firebird 2. Other versions may also
> be affected.
>
> SOLUTION:
> Update to version 2.0.1.
>
> PROVIDED AND/OR DISCOVERED BY:
> Cody Pierce, TippingPoint DVLabs
>
> ORIGINAL ADVISORY:
> http://dvlabs.tippingpoint.com/advisory/TPTI-07-11
>
> OTHER REFERENCES:
> http://www.firebirdsql.org/rlsnotes/Firebird-2.0.1-ReleaseNotes.pdf
>