First published: Fri Mar 15 2013(Updated: )
Stack-based buffer overflow in Firebird 2.1.3 through 2.1.5 before 18514, and 2.5.1 through 2.5.3 before 26623, on Windows allows remote attackers to execute arbitrary code via a crafted packet to TCP port 3050, related to a missing size check during extraction of a group number from CNCT information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FirebirdSQL | =2.1.3 | |
FirebirdSQL | =2.1.4 | |
FirebirdSQL | =2.1.5 | |
FirebirdSQL | =2.5.1 | |
FirebirdSQL | =2.5.2 | |
FirebirdSQL | =2.5.3 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2492 has been classified as a critical severity vulnerability due to its potential for remote code execution.
To fix CVE-2013-2492, update Firebird to a version that is not affected, such as Firebird 2.1.5 after patch 18514 or Firebird 2.5.3 after patch 26623.
CVE-2013-2492 affects Firebird versions 2.1.3 to 2.1.5 before 18514 and 2.5.1 to 2.5.3 before 26623.
Yes, CVE-2013-2492 can be exploited remotely through crafted packets sent to TCP port 3050.
CVE-2013-2492 is characterized as a stack-based buffer overflow vulnerability.