{"schema_version":"1.7.2","id":"OESA-2026-2013","modified":"2026-04-25T05:48:09Z","published":"2026-04-25T05:48:09Z","upstream":["CVE-2025-65104","CVE-2026-27890","CVE-2026-28212","CVE-2026-28214","CVE-2026-28224","CVE-2026-33337","CVE-2026-34232","CVE-2026-35215","CVE-2026-40342"],"summary":"firebird security update","details":"Firebird is a relational database offering many ANSI SQL standard features that runs on Linux, Windows, MacOS and a variety of Unix platforms. Firebird offers excellent concurrency, high performance, and powerful language support for stored procedures and triggers. It has been used in production systems, under a variety of names, since 1981.\r\n\r\nSecurity Fix(es):\n\nFirebird is an open-source relational database management system. In versions FB3 of the client library placed incorrect data length values into XSQLDA fields when communicating with FB4 or higher servers, resulting in an information leak. This issue is fixed by upgrading to the FB4 client or higher.(CVE-2025-65104)\n\nFirebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, when processing CNCT_specific_data segments during authentication, the server assumes segments arrive in strictly ascending order. If segments arrive out of order, the Array class&apos;s grow() method computes a negative size value, causing a SIGSEGV crash. An unauthenticated attacker who knows only the server&apos;s IP and port can exploit this to crash the server. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.(CVE-2026-27890)\n\nFirebird is an open-source relational database management system. In versions prior to 6.0.0, 5.0.4, 4.0.7 and 3.0.14, when processing an op_slice network packet, the server passes an unprepared structure containing a null pointer to the SDL_info() function, resulting in a null pointer dereference and server crash. An unauthenticated attacker can trigger this by sending a crafted packet to the server port. This issue has been fixed in versions 6.0.0, 5.0.4, 4.0.7 and 3.0.14.(CVE-2026-28212)\n\nFirebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, the ClumpletReader::getClumpletSize() function can overflow the totalLength value when parsing a Wide type clumplet, causing an infinite loop. An authenticated user with INSERT privileges on any table can exploit this via a crafted Batch Parameter Block to cause a denial of service against the server. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.(CVE-2026-28214)\n\nFirebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, when the server receives an op_crypt_key_callback packet without prior authentication, the port_server_crypt_callback handler is not initialized, resulting in a null pointer dereference and server crash. An unauthenticated attacker who knows only the server&apos;s IP and port can exploit this to crash the server. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.(CVE-2026-28224)\n\nFirebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, when deserializing a slice packet, the xdr_datum() function does not validate that a cstring length conforms to the slice descriptor bounds, allowing a cstring longer than the allocated buffer to overflow it. An unauthenticated attacker can exploit this by sending a crafted packet to the server, potentially causing a crash or other security impact. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.(CVE-2026-33337)\n\nFirebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, the xdr_status_vector() function does not handle the isc_arg_cstring type when decoding an op_response packet, causing a server crash when one is encountered in the status vector. An unauthenticated attacker can exploit this by sending a crafted op_response packet to the server. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.(CVE-2026-34232)\n\nFirebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, the sdl_desc() function does not validate the length of a decoded SDL descriptor from a slice packet. A zero-length descriptor is later used to calculate the number of slice items, causing a division by zero. An unauthenticated attacker can exploit this by sending a crafted slice packet to crash the server. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.(CVE-2026-35215)\n\nFirebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, the external engine plugin loader concatenates a user-supplied engine name into a filesystem path without filtering path separators or .. components. An authenticated user with CREATE FUNCTION privileges can use a crafted ENGINE name to load an arbitrary shared library from anywhere on the filesystem via path traversal. The library&apos;s initialization code executes immediately during loading, before Firebird validates the module, achieving code execution as the server&apos;s OS account. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.(CVE-2026-40342)","affected":[{"package":{"ecosystem":"openEuler:22.03-LTS-SP4","name":"firebird","purl":"pkg:rpm/openEuler/firebird&distro=openEuler-22.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.0.14.33856-1.oe2203sp4"}]}],"ecosystem_specific":{"aarch64":["firebird-3.0.14.33856-1.oe2203sp4.aarch64.rpm","firebird-debuginfo-3.0.14.33856-1.oe2203sp4.aarch64.rpm","firebird-debugsource-3.0.14.33856-1.oe2203sp4.aarch64.rpm","firebird-devel-3.0.14.33856-1.oe2203sp4.aarch64.rpm"],"noarch":["firebird-help-3.0.14.33856-1.oe2203sp4.noarch.rpm"],"src":["firebird-3.0.14.33856-1.oe2203sp4.src.rpm"],"x86_64":["firebird-3.0.14.33856-1.oe2203sp4.x86_64.rpm","firebird-debuginfo-3.0.14.33856-1.oe2203sp4.x86_64.rpm","firebird-debugsource-3.0.14.33856-1.oe2203sp4.x86_64.rpm","firebird-devel-3.0.14.33856-1.oe2203sp4.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2013"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-65104"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-27890"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-28212"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-28214"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-28224"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-33337"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-34232"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-35215"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-40342"}],"database_specific":{"severity":"Critical"}}
