First published: Sat Mar 21 2015(Updated: )
Multiple stack-based buffer overflows in the ib_fill_isqlda function in dbdimp.c in DBD-Firebird before 1.19 allow remote attackers to have unspecified impact via unknown vectors that trigger an error condition, related to binding octets to columns.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libdbd-firebird-perl | 1.32-1 1.34-1 1.35-1 | |
Debian Linux | =7.0 | |
Debian DBD-Firebird | <=1.18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2788 has a severity rating that indicates potential for serious impact due to multiple stack-based buffer overflows.
To fix CVE-2015-2788, update to versions 1.19 or later of the DBD-Firebird package.
Versions prior to 1.19 of the DBD-Firebird package are affected by CVE-2015-2788.
Yes, CVE-2015-2788 can be exploited remotely through crafted input that triggers stack-based buffer overflows.
CVE-2015-2788 can lead to unspecified impacts that may compromise system integrity or availability.