NIXPKGS-2026-1189
GitHub issue
published on
Permalink
CVE-2026-33337
7.5 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): HIGH
by @LeSuisse Activity log
- Created automatic suggestion
- @LeSuisse ignored package firebird-emu
- @LeSuisse accepted
- @LeSuisse published on GitHub
Firebird has a buffer overflow when parsing corrupted slice packets
Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, when deserializing a slice packet, the xdr_datum() function does not validate that a cstring length conforms to the slice descriptor bounds, allowing a cstring longer than the allocated buffer to overflow it. An unauthenticated attacker can exploit this by sending a crafted packet to the server, potentially causing a crash or other security impact. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.
References
-
https://github.com/FirebirdSQL/firebird/security/advisories/GHSA-89mq-229g-x47p x_refsource_CONFIRM
-
https://github.com/FirebirdSQL/firebird/releases/tag/v3.0.14 x_refsource_MISC
-
https://github.com/FirebirdSQL/firebird/releases/tag/v4.0.7 x_refsource_MISC
-
https://github.com/FirebirdSQL/firebird/releases/tag/v5.0.4 x_refsource_MISC
Affected products
firebird
- ==>= 5.0.0, < 5.0.4
- ==>= 3.0.0, < 3.0.14
- ==>= 4.0.0, < 4.0.7
Matching in nixpkgs
pkgs.firebird
SQL relational database management system
pkgs.firebird_3
SQL relational database management system
Package maintainers
-
@MarcWeber Marc Weber <marco-oweber@gmx.de>
-
@bbenno Benno Bielmeier <nix@bbenno.com>