Multiple stack-based buffer overflows in Borland InterBase LI 8.0.0.53 up to and including 8.1.0.253, and WI 5.1.1.680 up to and including 8.1.0.257, allow remote malicious users to execute arbitrary code via (1) a long service attach request on TCP port 3050 to the (a) SVC_attach or (b) INET_connect function, (2) a long create request on TCP port 3050 to the (c) isc_create_database or (d) jrd8_create_database function, (3) a long attach request on TCP port 3050 to the (e) isc_attach_database or (f) PWD_db_aliased function, or unspecified vectors involving the (4) jrd8_attach_database or (5) expand_filename2 function.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
borland software interbase wi-o6.0.2.0 |
||
borland software interbase wi-v5.1.1.680 |
||
borland software interbase wi-v7.5.1.80 |
||
borland software interbase wi-v8.0.0.123 |
||
borland software interbase li_8.0.0.253 |
||
borland software interbase li_8.0.0.53 |
||
borland software interbase wi-v6.0.1.0 |
||
borland software interbase wi-v6.0.1.6 |
||
borland software interbase li_8.0.0.54 |
||
borland software interbase wi-o6.0.1.6 |
||
borland software interbase wi-v6.5.0.28 |
||
borland software interbase wi-v7.0.1.1 |
||
borland software interbase wi-v7.5.0.129 |
||
borland software interbase wi-v5.5.0.742 |
||
borland software interbase wi-v6.0.0.627 |
||
borland software interbase wi_5.1.1.680 |
||
borland software interbase wi_8.1.0.257 |