Snort-alerts/EXPLOIT-Borland-Interbase-open-marker-file-overflow-attempt

From aldeid
Jump to navigation Jump to search

EXPLOIT Borland Interbase open_marker_file overflow attempt

Identification

Id 14602
Alert EXPLOIT Borland Interbase open_marker_file overflow attempt
Classification attempted-user

Trigger

Stack-based buffer overflow in Borland InterBase LI 8.0.0.53 through 8.1.0.253 on Linux, and possibly unspecified versions on Solaris, allows remote attackers to execute arbitrary code via a long attach request on TCP port 3050 to the open_marker_file function.

Affected systems

  • borland_software interbase li_8.0.0.253
  • borland_software interbase li_8.0.0.53
  • borland_software interbase li_8.0.0.54

Impact

Denial of Service. Information disclosure. Loss of integrity. Complete admin access.

False positives

None known

Scenario

INCOMPLETE SECTION OR ARTICLE
This section/article is being written and is therefore not complete.
Thank you for your comprehension.

Example

INCOMPLETE SECTION OR ARTICLE
This section/article is being written and is therefore not complete.
Thank you for your comprehension.

Corrective actions

  • Upgrade to the latest non-affected version of the software.
  • Apply the appropriate vendor supplied patches.