Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-2492

Опубликовано: 15 мар. 2013
Источник: ubuntu
Приоритет: medium
EPSS Высокий
CVSS2: 6.8

Описание

Stack-based buffer overflow in Firebird 2.1.3 through 2.1.5 before 18514, and 2.5.1 through 2.5.3 before 26623, on Windows allows remote attackers to execute arbitrary code via a crafted packet to TCP port 3050, related to a missing size check during extraction of a group number from CNCT information.

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

hardy

DNE

lucid

ignored

end of life
oneiric

ignored

end of life
precise

ignored

end of life
precise/esm

DNE

precise was needed
quantal

ignored

end of life
raring

DNE

saucy

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-apps/xenial

not-affected

2.5.2.26540.ds4-8ubuntu1
esm-infra-legacy/trusty

not-affected

2.5.2.26540.ds4-8ubuntu1
hardy

DNE

lucid

DNE

oneiric

ignored

end of life
precise

ignored

end of life
precise/esm

DNE

precise was needed
quantal

ignored

end of life
raring

ignored

end of life

Показывать по

EPSS

Процентиль: 99%
0.86704
Высокий

6.8 Medium

CVSS2

Связанные уязвимости

nvd
почти 13 лет назад

Stack-based buffer overflow in Firebird 2.1.3 through 2.1.5 before 18514, and 2.5.1 through 2.5.3 before 26623, on Windows allows remote attackers to execute arbitrary code via a crafted packet to TCP port 3050, related to a missing size check during extraction of a group number from CNCT information.

debian
почти 13 лет назад

Stack-based buffer overflow in Firebird 2.1.3 through 2.1.5 before 185 ...

github
больше 3 лет назад

Stack-based buffer overflow in Firebird 2.1.3 through 2.1.5 before 18514, and 2.5.1 through 2.5.3 before 26623, on Windows allows remote attackers to execute arbitrary code via a crafted packet to TCP port 3050, related to a missing size check during extraction of a group number from CNCT information.

fstec
почти 13 лет назад

Уязвимость системы управления базами данных Firebird, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 99%
0.86704
Высокий

6.8 Medium

CVSS2