fkie_cve-2025-24975
Vulnerability from fkie_nvd
Published
2025-08-15 15:15
Modified
2025-08-20 20:15
Severity ?
Summary
Firebird is a relational database. Prior to snapshot versions 4.0.6.3183, 5.0.2.1610, and 6.0.0.609, Firebird is vulnerable if ExtConnPoolSize is not set equal to 0. If connections stored in ExtConnPool are not verified for presence and suitability of the CryptCallback interface is used when created versus what is available could result in a segfault in the server process. Encrypted databases, accessed by execute statement on external, may be accessed later by an attachment missing a key to that database. In a case when execute statement are chained, segfault may happen. Additionally, the segfault may affect unencrypted databases. This issue has been patched in snapshot versions 4.0.6.3183, 5.0.2.1610, and 6.0.0.609 and point releases 4.0.6 and 5.0.2. A workaround for this issue involves setting ExtConnPoolSize equal to 0 in firebird.conf.
References
Impacted products
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "Firebird is a relational database. Prior to snapshot versions 4.0.6.3183, 5.0.2.1610, and 6.0.0.609, Firebird is vulnerable if ExtConnPoolSize is not set equal to 0. If connections stored in ExtConnPool are not verified for presence and suitability of the CryptCallback interface is used when created versus what is available could result in a segfault in the server process. Encrypted databases, accessed by execute statement on external, may be accessed later by an attachment missing a key to that database. In a case when execute statement are chained, segfault may happen. Additionally, the segfault may affect unencrypted databases. This issue has been patched in snapshot versions 4.0.6.3183, 5.0.2.1610, and 6.0.0.609 and point releases 4.0.6 and 5.0.2. A workaround for this issue involves setting ExtConnPoolSize equal to 0 in firebird.conf." }, { "lang": "es", "value": "Firebird es una base de datos relacional. En versiones anteriores a las instant\u00e1neas 4.0.6.3183, 5.0.2.1610 y 6.0.0.609, Firebird era vulnerable si ExtConnPoolSize no se establec\u00eda en 0. Si no se verifica la presencia y la idoneidad de la interfaz CryptCallback al crear las conexiones almacenadas en ExtConnPool, y se utiliza en lugar de la disponible, podr\u00eda producirse una violaci\u00f3n de segmentaci\u00f3n en el proceso del servidor. Las bases de datos cifradas, a las que se accede mediante una sentencia de ejecuci\u00f3n externa, podr\u00edan ser accedidas posteriormente por un archivo adjunto que no tenga la clave de esa base de datos. Al encadenar sentencias de ejecuci\u00f3n, podr\u00eda producirse una violaci\u00f3n de segmentaci\u00f3n. Adem\u00e1s, esta violaci\u00f3n puede afectar a bases de datos no cifradas. Este problema se ha corregido en las instant\u00e1neas 4.0.6.3183, 5.0.2.1610 y 6.0.0.609, as\u00ed como en las versiones puntuales 4.0.6 y 5.0.2. Una soluci\u00f3n alternativa para este problema implica establecer ExtConnPoolSize igual a 0 en firebird.conf." } ], "id": "CVE-2025-24975", "lastModified": "2025-08-20T20:15:31.597", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 5.5, "source": "security-advisories@github.com", "type": "Secondary" } ] }, "published": "2025-08-15T15:15:32.117", "references": [ { "source": "security-advisories@github.com", "url": "https://github.com/FirebirdSQL/firebird/commit/658abd20449f72097fbbce57e8e6ae42ff837fb6" }, { "source": "security-advisories@github.com", "url": "https://github.com/FirebirdSQL/firebird/issues/8429" }, { "source": "security-advisories@github.com", "url": "https://github.com/FirebirdSQL/firebird/security/advisories/GHSA-fx9r-rj68-7p69" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.vicarius.io/vsociety/posts/cve-2025-24975-detect-vulnerable-firebird" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.vicarius.io/vsociety/posts/cve-2025-24975-mitigate-firebird-vulnerability" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Awaiting Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-754" } ], "source": "security-advisories@github.com", "type": "Secondary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…