Snort-alerts/EXPLOIT-Borland-Interbase-open-marker-file-overflow-attempt
Jump to navigation
Jump to search
EXPLOIT Borland Interbase open_marker_file overflow attempt
Identification
Id | 14602 |
---|---|
Alert | EXPLOIT Borland Interbase open_marker_file overflow attempt |
Classification | attempted-user |
Trigger
Stack-based buffer overflow in Borland InterBase LI 8.0.0.53 through 8.1.0.253 on Linux, and possibly unspecified versions on Solaris, allows remote attackers to execute arbitrary code via a long attach request on TCP port 3050 to the open_marker_file function.
Affected systems
- borland_software interbase li_8.0.0.253
- borland_software interbase li_8.0.0.53
- borland_software interbase li_8.0.0.54
Impact
Denial of Service. Information disclosure. Loss of integrity. Complete admin access.
False positives
None known
Scenario
INCOMPLETE SECTION OR ARTICLE
This section/article is being written and is therefore not complete.
Thank you for your comprehension.
Thank you for your comprehension.
Example
INCOMPLETE SECTION OR ARTICLE
This section/article is being written and is therefore not complete.
Thank you for your comprehension.
Thank you for your comprehension.
Corrective actions
- Upgrade to the latest non-affected version of the software.
- Apply the appropriate vendor supplied patches.