---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: Firebird "op_connect_request" Packet Denial of Service SECUNIA ADVISORY ID: SA36026 VERIFY ADVISORY: http://secunia.com/advisories/36026/ DESCRIPTION: A vulnerability has been reported in Firebird, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error in the processing of "op_connect_request" packets and can be exploited to cause a DoS by sending a specially crafted packet to an affected system. Successful exploitation allows to close the listening port 3050/TCP for 2.1.x and 2.0.x releases, or crash the server for 1.5.x versions. SOLUTION: Fixed in the CVS repositories. http://firebird.cvs.sourceforge.net/firebird/firebird2/src/remote/server.cpp http://firebird.cvs.sourceforge.net/firebird/firebird2/src/remote/server.cpp?r1=1.260&r2=1.261 http://firebird.cvs.sourceforge.net/firebird/firebird2/src/remote/server.cpp?r1=1.158.2.6&r2=1.158.2.7 http://firebird.cvs.sourceforge.net/firebird/firebird2/src/remote/server.cpp?r1=1.126.2.16&r2=1.126.2.17 http://firebird.cvs.sourceforge.net/firebird/firebird2/src/remote/server.cpp?r1=1.34.2.7&r2=1.34.2.8 PROVIDED AND/OR DISCOVERED BY: Francisco Falcon, Core Security Technologies. ORIGINAL ADVISORY: Firebird: http://tracker.firebirdsql.org/browse/CORE-2563 CORE-2009-0707: http://www.coresecurity.com/content/firebird-sql-dos ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------