Hi,
The vulnerability allows remote unauthenticated users to cause a denial
of service via a NULL pointer dereference and subsequent crash of the
server.
The exploit requires network access to the server. Obviously servers
with a publicly accessible IP address are more vulnerable.
A malicious user can cause a DoS attack on a Firebird server by sending
a specific sequence of bytes. It is not necessary to be logged in to the
server. To exploit the vulnerability, it is sufficient to have access to
the Firebird port.
The Classic server architecture is less vulnerable, inasmuch as existing
connections will remain active. However if the attack is sustained no
new connections will be possible for the lifetime of the attack, no
matter which architecture is used.
It is not known if ZDI has developed a proof of concept. However, once
the vulnerability is published one should expect rogue users to develop
an attack. With increased access to LLMs to generate code the
development of exploits of all kinds has become considerably easier.
Users should update their installation to a fixed version.
regards
Pavel Cisar
IBPhoenix
Dne 13. 08. 25 v 17:46 Rand Random napsal(a):
> --
> Support the ongoing development of Firebird! Consider donating to the
> Firebird Foundation and help ensure its future. Every contribution makes
> a difference. Learn more and donate here:
>
https://www.firebirdsql.org/donate <
https://www.firebirdsql.org/donate>
> ---
> You received this message because you are subscribed to the Google
> Groups "firebird-general" group.
> To unsubscribe from this group and stop receiving emails from it, send
> an email to
firebird-gener...@googlegroups.com
> <mailto:
firebird-gener...@googlegroups.com>.
> To view this discussion, visit
https://groups.google.com/d/msgid/
> firebird-general/b29b4179-0c24-4a53-a2fd-
> eb8041afc236n%
40googlegroups.com <
https://groups.google.com/d/msgid/
> firebird-general/b29b4179-0c24-4a53-a2fd-
> eb8041afc236n%
40googlegroups.com?utm_medium=email&utm_source=footer>.