-=| Salvatore Bonaccorso, 18.04.2026 21:08:27 +0200 |=-
> Source: firebird3.0
> Version: 3.0.13.ds7-2
> Severity: important
> Tags: security upstream
> X-Debbugs-Cc: [email protected], Debian Security Team 
> <[email protected]>
> 
> Hi,
> 
> The following vulnerabilities were published for firebird3.0.
> 
> CVE-2025-65104[0]:
> | Firebird is an open-source relational database management system. In
> | versions FB3 of the client library placed incorrect data length
> | values into XSQLDA fields when communicating with FB4 or higher
> | servers, resulting in an information leak. This issue is fixed by
> | upgrading to the FB4 client or higher.

Upstream fix fir FB3 is in 247ebb1288939e31021edd9bdf6892475dd6d2fd

> CVE-2026-27890[1]:
> | Firebird is an open-source relational database management system. In
> | versions prior to 5.0.4, 4.0.7 and 3.0.14, when processing
> | CNCT_specific_data segments during authentication, the server
> | assumes segments arrive in strictly ascending order. If segments
> | arrive out of order, the Array class's grow() method computes a
> | negative size value, causing a SIGSEGV crash. An unauthenticated
> | attacker who knows only the server's IP and port can exploit this to
> | crash the server. This issue has been fixed in versions 5.0.4, 4.0.7
> | and 3.0.14.

Upstream fix for FB3 is in 6e937f09157a7c2aafdfebe618bc73f5f8c08067


> CVE-2026-28212[2]:
> | Firebird is an open-source relational database management system. In
> | versions prior to 6.0.0, 5.0.4, 4.0.7 and 3.0.14, when processing an
> | op_slice network packet, the server passes an unprepared structure
> | containing a null pointer to the SDL_info() function, resulting in a
> | null pointer dereference and server crash. An unauthenticated
> | attacker can trigger this by sending a crafted packet to the server
> | port. This issue has been fixed in versions 6.0.0, 5.0.4, 4.0.7 and
> | 3.0.14.

Upstream fix for FB3 is in 0b4a287d136426cc2fbae2ed75f4d12d579c65bf


> CVE-2026-28214[3]:
> | Firebird is an open-source relational database management system. In
> | versions prior to 5.0.4, 4.0.7 and 3.0.14, the
> | ClumpletReader::getClumpletSize() function can overflow the
> | totalLength value when parsing a Wide type clumplet, causing an
> | infinite loop. An authenticated user with INSERT privileges on any
> | table can exploit this via a crafted Batch Parameter Block to cause
> | a denial of service against the server. This issue has been fixed in
> | versions 5.0.4, 4.0.7 and 3.0.14.

Upstream fix for FB3 is in 3386555d7914f30ef565a8aa152565c1deb5b563

> CVE-2026-28224[4]:
> | Firebird is an open-source relational database management system. In
> | versions prior to 5.0.4, 4.0.7 and 3.0.14, when the server receives
> | an op_crypt_key_callback packet without prior authentication, the
> | port_server_crypt_callback handler is not initialized, resulting in
> | a null pointer dereference and server crash. An unauthenticated
> | attacker who knows only the server's IP and port can exploit this to
> | crash the server. This issue has been fixed in versions 5.0.4, 4.0.7
> | and 3.0.14.

Upstream fix for FB3 is in 323ea8ef3b87bfbfd4b1b8c3c99ae8c85ac23bfc

> CVE-2026-33337[5]:
> | Firebird is an open-source relational database management system. In
> | versions prior to 5.0.4, 4.0.7 and 3.0.14, when deserializing a
> | slice packet, the xdr_datum() function does not validate that a
> | cstring length conforms to the slice descriptor bounds, allowing a
> | cstring longer than the allocated buffer to overflow it. An
> | unauthenticated attacker can exploit this by sending a crafted
> | packet to the server, potentially causing a crash or other security
> | impact. This issue has been fixed in versions 5.0.4, 4.0.7 and
> | 3.0.14.

Upstream fix for FB3 is in 05252e5570051f5b5c2451116e930fbe255c50a3

> CVE-2026-34232[6]:
> | Firebird is an open-source relational database management system. In
> | versions prior to 5.0.4, 4.0.7 and 3.0.14, the xdr_status_vector()
> | function does not handle the isc_arg_cstring type when decoding an
> | op_response packet, causing a server crash when one is encountered
> | in the status vector. An unauthenticated attacker can exploit this
> | by sending a crafted op_response packet to the server. This issue
> | has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.

Upstream fix for FB3 is in ae05e8e518e68669a14f549ddd5ffe52085022c0

> CVE-2026-35215[7]:
> | Firebird is an open-source relational database management system. In
> | versions prior to 5.0.4, 4.0.7 and 3.0.14, the sdl_desc() function
> | does not validate the length of a decoded SDL descriptor from a
> | slice packet. A zero-length descriptor is later used to calculate
> | the number of slice items, causing a division by zero. An
> | unauthenticated attacker can exploit this by sending a crafted slice
> | packet to crash the server. This issue has been fixed in versions
> | 5.0.4, 4.0.7 and 3.0.14.

Upstream fix for FB3 is in df0f95969e4db2369df84e407577a2a794b13bcb

> CVE-2026-40342[8]:
> | Firebird is an open-source relational database management system. In
> | versions prior to 5.0.4, 4.0.7 and 3.0.14, the external engine
> | plugin loader concatenates a user-supplied engine name into a
> | filesystem path without filtering path separators or .. components.
> | An authenticated user with CREATE FUNCTION privileges can use a
> | crafted ENGINE name to load an arbitrary shared library from
> | anywhere on the filesystem via path traversal. The library's
> | initialization code executes immediately during loading, before
> | Firebird validates the module, achieving code execution as the
> | server's OS account. This issue has been fixed in versions 5.0.4,
> | 4.0.7 and 3.0.14.

Upstream fix for FB3 is in 001d0499dcea65318dcaf594c03b9c277cf7a5a3


-- Damyan

Reply via email to