GLSA-201512-11 : Firebird: Buffer Overflow

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote Gentoo host is missing one or more security-related
patches.

Description :

The remote host is affected by the vulnerability described in GLSA-201512-11
(Firebird: Buffer Overflow)

The vulnerability is caused due to an error when processing requests
from remote clients.

Impact :

A remote attacker could possibly execute arbitrary code with the
privileges of the process, or cause a Denial of Service condition.

Workaround :

There is no known workaround at this time.

See also :

https://security.gentoo.org/glsa/201512-11

Solution :

All Firebird users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose
'>=dev-db/firebird-2.5.3.26780.0-r3'
NOTE: Firebird package was moved to the testing branch (unstable) of
Gentoo. There is currently no stable version of Firebird, and there will
be no further GLSAs for this package.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
Public Exploit Available : true

Family: Gentoo Local Security Checks

Nessus Plugin ID: 87711 ()

Bugtraq ID:

CVE ID: CVE-2013-2492

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now