There is an grave security bug in firebird package 2.0 from debian and ubuntu
where an user can connect to the server with SYSDBA and NO password
The bug is now fixed in debian sid (unstable)
An quick fix if you have an firebird2.0 debian/ubuntu package is to delete these lines in the /etc/init.d/firebird2.0-super
[ -r “$DBAPasswordFile” ] && . “$DBAPasswordFile”
Or get the git version of the package and copy the init script
$sudo cp 2.0/debian/firebird2.0-super.init /etc/init.d/firebird2.0-super
This Debian security advisory is a bit unusual. While it’s normally
our strict policy to backport security bugfixes to older releases, this
turned out to be infeasible for Firebird 1.5 due to large infrastructural
changes necessary to fix these issues. As a consequence security support
for Firebird 1.5 is hereby discontinued, leaving two options to
administrators running a Firebird database:
I. Administrators running Firebird in a completely internal setup with
trusted users could leave it unchanged.
II. Everyone else should upgrade to the firebird2.0 packages available at
Version 126.96.36.19981.ds1-6~bpo40+1 fixes all known issues.
Please refer to the general backports.org documentation to add the
packages to your package management configuration:
These packages are backported to run with Debian stable. Since
firebird2.0 is not a drop-in replacement for firebird2 (which
is the source package name for the Firebird 1.5 packages)
these updates are not released through security.debian.org.
Potential future security problems affecting Debian stable will be
released through backports.org as well.
Arrangements have been made to ensure that Firebird in the upcoming
Debian 5.0 release will be supportable with regular backported
security bugfixes again.
Firebird Remove Buffer Overflow Proof of concept was posted on BugTraq
The bug is the one fixed in the next stable releases and is not present in firebird 2.1 rc1& rc2 here is the description:
Integer overflow in Firebird SQL 1.0.3 and earlier, 1.5.x before 1.5.6, 2.0.x before 2.0.4, and 2.1.x before 2.1.0 RC1 might allow remote attackers to execute arbitrary code
Fixed security2.fdb while installing from bsd package
(it had wrong permissions )
Firebird is prone to an integer-overflow vulnerability because it fails to ensure that integer values aren’t overrun. Attackers may exploit this issue to overflow a buffer and to corrupt process memory.
Attackers may be able to execute arbitrary machine code in the context of an affected application. Failed exploit attempts will likely result in a denial-of-service condition.
In a story headlined, “Open Source Code Contains Security Holes,” I referred recently to the Firebird database project as “somewhat moribund.” So imagine my surprise when a reader pointed out it was named project of the month in December by SourceForge, the dominant host of open source projects. Geez. Then there was the case of the supposedly “inactive” FreeBSD Unix.
Read the full response here
The following was sent to Charles Babcock at Information week in reply to an article entitled:
As a developer and administrator of the Firebird Project I completely reject the statement you made in the above article.
“The somewhat moribund Firebird project, for example, is listed with 195 identified defects, of which it has verified zero and fixed zero. The active Firefox browser project, on the other hand,
has fixed 370 bugs, verified 56 and faces another 246 to verify and fix.”