Debian Bug report logs -
#438855
firebird1.x is not supported by upstream any more
Toggle useless messages
Report forwarded to debian-bugs-dist@lists.debian.org, Debian Security Team <team@security.debian.org>, Debian Firebird Group <pkg-firebird-general@lists.alioth.debian.org>:
Bug#432753; Package firebird1.5.
(full text, mbox, link).
Acknowledgement sent to Stefan Fritsch <sf@sfritsch.de>:
New Bug report received and forwarded. Copy sent to Debian Security Team <team@security.debian.org>, Debian Firebird Group <pkg-firebird-general@lists.alioth.debian.org>.
(full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Package: firebird1.5
Severity: normal
Tags: security
These issues are reported to be fixed in 2.0, but I can't find any references in
the changelogs that they are fixed in 1.5:
CVE-2006-7214
Multiple unspecified vulnerabilities in Firebird 1.5 allow remote attackers to
(1) cause a denial of service (application crash) by sending many remote
protocol versions; and (2) cause a denial of service (connection drop) via
certain network traffic, as demonstrated by Nessus vulnerability scanning.
CVE-2006-7213
Firebird 1.5 allows remote authenticated users without SYSDBA and owner
permissions to overwrite a database by creating a database.
CVE-2006-7212
Multiple buffer overflows in Firebird 1.5, one of which affects WNET, have
unknown impact and attack vectors. NOTE: this issue might overlap CVE-2006-1240.
CVE-2006-7211
fb_lock_mgr in Firebird 1.5 uses weak permissions (0666) for the semaphore
array, which allows local users to cause a denial of service (blocked query
processing) by locking semaphores.
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7211
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7212
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7213
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7214
Information forwarded to debian-bugs-dist@lists.debian.org, Debian Firebird Group <pkg-firebird-general@lists.alioth.debian.org>:
Bug#432753; Package firebird1.5.
(full text, mbox, link).
Acknowledgement sent to Stefan Fritsch <sf@sfritsch.de>:
Extra info received and forwarded to list. Copy sent to Debian Firebird Group <pkg-firebird-general@lists.alioth.debian.org>.
(full text, mbox, link).
Message #10 received at 432753@bugs.debian.org (full text, mbox, reply):
Hi,
it seems I was wrong about CVE-2006-7211, which is probably #362001
fixed in 1.5.3.4870-4.
Cheers,
Stefan
Information forwarded to debian-bugs-dist@lists.debian.org, Debian Firebird Group <pkg-firebird-general@lists.alioth.debian.org>:
Bug#432753; Package firebird1.5.
(full text, mbox, link).
Acknowledgement sent to Damyan Ivanov <dam@modsoftsys.com>:
Extra info received and forwarded to list. Copy sent to Debian Firebird Group <pkg-firebird-general@lists.alioth.debian.org>.
(full text, mbox, link).
Message #15 received at 432753@bugs.debian.org (full text, mbox, reply):
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- -=| Stefan Fritsch, 11.07.2007 22:19 |=-
Hi, Stefan,
Thank you very much for taking time to investigate these CVEs.
> it seems I was wrong about CVE-2006-7211, which is probably #362001
> fixed in 1.5.3.4870-4.
One less. This is good :)
If you have time, you may want to take a look ath
http://bugs.debian.org/src:firebird2
firebird2 was renamed to firebird1.5 after Etch release.
I am with limited connectivity until the end of the week.
If I may add one more wish, can you try to reproduce these bugs with
current firebird1.5 packages? Note there are two flavours -
firebird1.5-super and firebird1.5-classic.
Thanks again,
dam
- --
Damyan Ivanov JabberID: dam@jabber.minus273.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFGlgcxHqjlqpcl9jsRArzLAKC5OlGdwZ6r0n0VZbcu/vPpCb7HVACfbi7y
34EQVT1B1DQ10GNSU5xqbHo=
=TfJG
-----END PGP SIGNATURE-----
Information forwarded to debian-bugs-dist@lists.debian.org, Debian Firebird Group <pkg-firebird-general@lists.alioth.debian.org>:
Bug#432753; Package firebird1.5.
(full text, mbox, link).
Acknowledgement sent to Moritz Muehlenhoff <jmm@inutil.org>:
Extra info received and forwarded to list. Copy sent to Debian Firebird Group <pkg-firebird-general@lists.alioth.debian.org>.
(full text, mbox, link).
Message #20 received at 432753@bugs.debian.org (full text, mbox, reply):
Damyan Ivanov wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> - -=| Stefan Fritsch, 11.07.2007 22:19 |=-
>
> Hi, Stefan,
>
> Thank you very much for taking time to investigate these CVEs.
It's been a month now. Is firebird in stable affected?
If you can't figure it out yourself as the maintainer you need to
contact upstream.
Cheers,
Moritz
Information forwarded to debian-bugs-dist@lists.debian.org, Debian Firebird Group <pkg-firebird-general@lists.alioth.debian.org>:
Bug#432753; Package firebird1.5.
(full text, mbox, link).
Acknowledgement sent to Damyan Ivanov <dam@modsoftsys.com>:
Extra info received and forwarded to list. Copy sent to Debian Firebird Group <pkg-firebird-general@lists.alioth.debian.org>.
(full text, mbox, link).
Message #25 received at 432753@bugs.debian.org (full text, mbox, reply):
Dear Firebird developers,
I've got a bug report for the debian packages for firebrid 1.5 that I
can't handle myself. I would be grateful for some insights.
http://bugs.debian.org/432753
There is some uncertainty about four CVE issues with regard of their
presence in Firebird 1.5.3.
Two of these
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7213
CVE-2006-7213
Firebird 1.5 allows remote authenticated users without SYSDBA and
owner permissions to overwrite a database by creating a database.
and
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7211
CVE-2006-7211
fb_lock_mgr in Firebird 1.5 uses weak permissions (0666) for the
semaphore array, which allows local users to cause a denial of
service (blocked query processing) by locking semaphores.
are unreproducible with Debian packages and thus are not that interesting.
The other two, however are rather unclear as of how to reproduce or
whether they are fixed in 1.5.3 (or 1.5.4) so I'd appreciate your comments:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7214
CVE-2006-7214
Multiple unspecified vulnerabilities in Firebird 1.5 allow remote
attackers to (1) cause a denial of service (application crash) by
sending many remote protocol versions; and (2) cause a denial of
service (connection drop) via certain network traffic, as
demonstrated by Nessus vulnerability scanning.
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7212
CVE-2006-7212
Multiple buffer overflows in Firebird 1.5, one of which affects
WNET, have unknown impact and attack vectors. NOTE: this issue might
overlap CVE-2006-1240.
As far as I can tell, the existence of the issues is deduced from
firebird 2.0 release notes, which are not very clear about what exactly
the problem is and how to reproduce it.
Your comments are much appreciated. Please carbon-copy
432753@bugs.debian.org in your replies.
--
dam JabberID: dam@jabber.minus273.org
Information forwarded to debian-bugs-dist@lists.debian.org, Debian Firebird Group <pkg-firebird-general@lists.alioth.debian.org>:
Bug#432753; Package firebird1.5.
(full text, mbox, link).
Acknowledgement sent to Alex Peshkov <peshkoff@mail.ru>:
Extra info received and forwarded to list. Copy sent to Debian Firebird Group <pkg-firebird-general@lists.alioth.debian.org>.
(full text, mbox, link).
Message #30 received at 432753@bugs.debian.org (full text, mbox, reply):
On Wednesday 15 August 2007 00:33, Damyan Ivanov wrote:
> Dear Firebird developers,
>
> I've got a bug report for the debian packages for firebrid 1.5 that I
> can't handle myself. I would be grateful for some insights.
>
//....
> The other two, however are rather unclear as of how to reproduce or
> whether they are fixed in 1.5.3 (or 1.5.4) so I'd appreciate your comments:
In brief - firebird 1.5 is not supported any more. It was decided not to have
any more point releases of it.
> http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7214
> CVE-2006-7214
> Multiple unspecified vulnerabilities in Firebird 1.5 allow remote
> attackers to (1) cause a denial of service (application crash) by
> sending many remote protocol versions; and (2) cause a denial of
> service (connection drop) via certain network traffic, as
> demonstrated by Nessus vulnerability scanning.
This one in theory can be fixed - backporting from HEAD is possible.
> http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7212
> CVE-2006-7212
> Multiple buffer overflows in Firebird 1.5, one of which affects
> WNET, have unknown impact and attack vectors. NOTE: this issue might
> overlap CVE-2006-1240.
They are so multiple that it's close to impossible to backport them. Moreover,
fixes for some of them are based on new collection of classes, introduced in
2.0. I.e. firebird after fixing all BOFs will not be 1.5 any more :)
> As far as I can tell, the existence of the issues is deduced from
> firebird 2.0 release notes, which are not very clear about what exactly
> the problem is and how to reproduce it.
>
> Your comments are much appreciated. Please carbon-copy
> 432753@bugs.debian.org in your replies.
Alex.
Information forwarded to debian-bugs-dist@lists.debian.org, Debian Firebird Group <pkg-firebird-general@lists.alioth.debian.org>:
Bug#432753; Package firebird1.5.
(full text, mbox, link).
Acknowledgement sent to Damyan Ivanov <dam@modsoftsys.com>:
Extra info received and forwarded to list. Copy sent to Debian Firebird Group <pkg-firebird-general@lists.alioth.debian.org>.
(full text, mbox, link).
Message #35 received at 432753@bugs.debian.org (full text, mbox, reply):
[please keep Cc: 432753@bugs.debian.org as before. Thanks!]
Hi, Alex,
Thank you for taking time to reply.
-=| Alex Peshkov, 15.08.2007 09:32 |=-
> On Wednesday 15 August 2007 00:33, Damyan Ivanov wrote:
> In brief - firebird 1.5 is not supported any more. It was decided not to have
> any more point releases of it.
Understood.
>> http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7214
>> CVE-2006-7214
>> Multiple unspecified vulnerabilities in Firebird 1.5 allow remote
>> attackers to (1) cause a denial of service (application crash) by
>> sending many remote protocol versions; and (2) cause a denial of
>> service (connection drop) via certain network traffic, as
>> demonstrated by Nessus vulnerability scanning.
>
> This one in theory can be fixed - backporting from HEAD is possible.
OK. I don't require that you make the porting. I just need some clues
about what exactly the problems are (instructions how to reproduce them
would be nice) and where to look at for fixes. Is this feasible?
I really would not want to take too much time from you.
>> http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7212
>> CVE-2006-7212
>> Multiple buffer overflows in Firebird 1.5, one of which affects
>> WNET, have unknown impact and attack vectors. NOTE: this issue might
>> overlap CVE-2006-1240.
>
> They are so multiple that it's close to impossible to backport them. Moreover,
> fixes for some of them are based on new collection of classes, introduced in
> 2.0. I.e. firebird after fixing all BOFs will not be 1.5 any more :)
I see. Unfortunately we can't just drop 2.0 as a replacement for 1.5 in
Debian/stable, because "stable" is meant to not offer *any* surprises
and migration from 1.5 to 2.0 is far from trivial.
Can you estimate to what extentt 1.5.4 suffers from this, compared to 1.5.3?
--
dam JabberID: dam@jabber.minus273.org
Information forwarded to debian-bugs-dist@lists.debian.org, Debian Firebird Group <pkg-firebird-general@lists.alioth.debian.org>:
Bug#432753; Package firebird1.5.
(full text, mbox, link).
Acknowledgement sent to Alex Peshkov <peshkoff@mail.ru>:
Extra info received and forwarded to list. Copy sent to Debian Firebird Group <pkg-firebird-general@lists.alioth.debian.org>.
(full text, mbox, link).
Message #40 received at 432753@bugs.debian.org (full text, mbox, reply):
On Wednesday 15 August 2007 11:05, Damyan Ivanov wrote:
> >> http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7214
> >> CVE-2006-7214
> >> Multiple unspecified vulnerabilities in Firebird 1.5 allow remote
> >> attackers to (1) cause a denial of service (application crash) by
> >> sending many remote protocol versions; and (2) cause a denial of
> >> service (connection drop) via certain network traffic, as
> >> demonstrated by Nessus vulnerability scanning.
> >
> > This one in theory can be fixed - backporting from HEAD is possible.
>
> OK. I don't require that you make the porting. I just need some clues
> about what exactly the problems are (instructions how to reproduce them
> would be nice) and where to look at for fixes. Is this feasible?
> I really would not want to take too much time from you.
No 1 is specially dangerous cause easy to reproduce (with 2.0 I failed to kill
server with Nessus - may be did not run it long enough).
There is fixed size CNCT_VERSIONS plain-C array p_cnct_versions (see
op_connect in protocol.cpp, bool_t xdr_protocol(XDR* xdrs, PACKET* p)). I
think that comparing one from 1.5 and HEAD will give you clear idea what
happens. To reliably reproduce an issue I was building a special client that
was sending >10 kinds of suggested protocol to server. I did not keep it
after fixing a bug.
> >> http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7212
> >> CVE-2006-7212
> >> Multiple buffer overflows in Firebird 1.5, one of which affects
> >> WNET, have unknown impact and attack vectors. NOTE: this issue might
> >> overlap CVE-2006-1240.
> >
> > They are so multiple that it's close to impossible to backport them.
> > Moreover, fixes for some of them are based on new collection of classes,
> > introduced in 2.0. I.e. firebird after fixing all BOFs will not be 1.5
> > any more :)
>
> I see. Unfortunately we can't just drop 2.0 as a replacement for 1.5 in
> Debian/stable, because "stable" is meant to not offer *any* surprises
> and migration from 1.5 to 2.0 is far from trivial.
>
> Can you estimate to what extentt 1.5.4 suffers from this, compared to
> 1.5.3?
Some are fixed, most not.
Information forwarded to debian-bugs-dist@lists.debian.org, Debian Firebird Group <pkg-firebird-general@lists.alioth.debian.org>:
Bug#432753; Package firebird1.5.
(full text, mbox, link).
Acknowledgement sent to Adriano dos Santos Fernandes <adrianosf@uol.com.br>:
Extra info received and forwarded to list. Copy sent to Debian Firebird Group <pkg-firebird-general@lists.alioth.debian.org>.
(full text, mbox, link).
Message #45 received at 432753@bugs.debian.org (full text, mbox, reply):
Damyan Ivanov escreveu:
> Dear Firebird developers,
>
> I've got a bug report for the debian packages for firebrid 1.5 that I
> can't handle myself. I would be grateful for some insights.
>
> http://bugs.debian.org/432753
>
> There is some uncertainty about four CVE issues with regard of their
> presence in Firebird 1.5.3.
>
> Two of these
> http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7213
> CVE-2006-7213
> Firebird 1.5 allows remote authenticated users without SYSDBA and
> owner permissions to overwrite a database by creating a database.
>
SF #1155520 - Any user can replace databases created by others
Adriano
Information forwarded to debian-bugs-dist@lists.debian.org, Debian Firebird Group <pkg-firebird-general@lists.alioth.debian.org>:
Bug#432753; Package firebird1.5.
(full text, mbox, link).
Acknowledgement sent to Damyan Ivanov <dam@modsoftsys.com>:
Extra info received and forwarded to list. Copy sent to Debian Firebird Group <pkg-firebird-general@lists.alioth.debian.org>.
(full text, mbox, link).
Message #50 received at 432753@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
-=| Adriano dos Santos Fernandes, 15.08.2007 13:31 |=-
>> http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7213
>> CVE-2006-7213
>> Firebird 1.5 allows remote authenticated users without SYSDBA and
>> owner permissions to overwrite a database by creating a database.
>>
> SF #1155520 - Any user can replace databases created by others
Thanks, Adriano for the pointer.
I looked this up in CVS and I must admit that the change is not present
in 1.5.3 (stable) *and* 1.5.4 (unstable/testing). The code also gave me
a different attack vector. I'll try reproducing this soon.
Note to self: try to replace existing database with "gbak -r", being
non-owner, non-sysdba user.
--
dam JabberID: dam@jabber.minus273.org
[signature.asc (application/pgp-signature, attachment)]
Information forwarded to debian-bugs-dist@lists.debian.org, Debian Firebird Group <pkg-firebird-general@lists.alioth.debian.org>:
Bug#432753; Package firebird1.5.
(full text, mbox, link).
Acknowledgement sent to Damyan Ivanov <dam@modsoftsys.com>:
Extra info received and forwarded to list. Copy sent to Debian Firebird Group <pkg-firebird-general@lists.alioth.debian.org>.
(full text, mbox, link).
Message #55 received at 432753@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
clone 432753 -1 -2
retitle -2 firebird1.x is not supported by upstream any more
severity -2 serious
thanks
-=| Stefan Fritsch, 11.07.2007 22:13 |=-
> These issues are reported to be fixed in 2.0, but I can't find any references in
> the changelogs that they are fixed in 1.5:
>
>
> CVE-2006-7214
>
> Multiple unspecified vulnerabilities in Firebird 1.5 allow remote attackers to
> (1) cause a denial of service (application crash) by sending many remote
> protocol versions; and (2) cause a denial of service (connection drop) via
> certain network traffic, as demonstrated by Nessus vulnerability scanning.
>
> CVE-2006-7213
>
> Firebird 1.5 allows remote authenticated users without SYSDBA and owner
> permissions to overwrite a database by creating a database.
>
> CVE-2006-7212
>
> Multiple buffer overflows in Firebird 1.5, one of which affects WNET, have
> unknown impact and attack vectors. NOTE: this issue might overlap CVE-2006-1240.
>
> CVE-2006-7211
>
> fb_lock_mgr in Firebird 1.5 uses weak permissions (0666) for the semaphore
> array, which allows local users to cause a denial of service (blocked query
> processing) by locking semaphores.
Here's the current status:
The first three affect all versions of the package
(sarge-etch-lenny-sid). Note that in lenny/sid the package is renamed to
firebird1.5, sarge and etch use firebird2 name.
CVE-2006-7211 was patched locally so debian packages are not vulnerable
in all suites.
CVE-2006-7214 and CVE-2006-7212 cannot be easily fixed. The upstream
release (2.0.x) that fixes these is a major rework and back-porting
means adopting the new release (quoting upstream, my impression too).
This is practically impossible for (old)stable. Even if we want to apply
the iceweasel approach, the new upstream release requires migration of
the databases so this is infeasible for stable/oldstable.
CVE-2006-7213 can be fixed by the patch based on that change
http://firebird.cvs.sourceforge.net/firebird/firebird2/src/jrd/jrd.cpp?r1=1.206&r2=1.207
I've consulted with upstream and decided to schedule firebird1.5 for
removal from unstable/testing because it is no longer supported by them.
I guess removing firebird2 from stable/oldstable is not an option? :/
I can prepare packages that fix CVE-2006-7213 for etch and sarge.
-7212 and -7214 can't be fixed, though. What do we do?
--
dam JabberID: dam@jabber.minus273.org
[signature.asc (application/pgp-signature, attachment)]
Bug 432753 cloned as bugs 438854, 438855.
Request was from Damyan Ivanov <dam@modsoftsys.com>
to control@bugs.debian.org.
(Mon, 20 Aug 2007 10:30:05 GMT) (full text, mbox, link).
Changed Bug title to `firebird1.x is not supported by upstream any more' from `CVE-2006-7211 to 7214 : unfixed in firebird1.5'.
Request was from Damyan Ivanov <dam@modsoftsys.com>
to control@bugs.debian.org.
(Mon, 20 Aug 2007 10:30:09 GMT) (full text, mbox, link).
Severity set to `serious' from `normal'
Request was from Damyan Ivanov <dam@modsoftsys.com>
to control@bugs.debian.org.
(Mon, 20 Aug 2007 10:30:09 GMT) (full text, mbox, link).
Information forwarded to debian-bugs-dist@lists.debian.org, Debian Firebird Group <pkg-firebird-general@lists.alioth.debian.org>:
Bug#438855; Package firebird1.5.
(full text, mbox, link).
Acknowledgement sent to Damyan Ivanov <dmn@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian Firebird Group <pkg-firebird-general@lists.alioth.debian.org>.
(full text, mbox, link).
Message #66 received at 438855@bugs.debian.org (full text, mbox, reply):
# Automatically generated email from bts, devscripts version 2.10.7
# I needed one clone
merge 438854 438855
Owner recorded as Damyan Ivanov <dmn@debian.org>.
Request was from Damyan Ivanov <dmn@debian.org>
to control@bugs.debian.org.
(Mon, 20 Aug 2007 10:39:05 GMT) (full text, mbox, link).
Reply sent to Damyan Ivanov <dmn@debian.org>:
You have taken responsibility.
(full text, mbox, link).
Notification sent to Stefan Fritsch <sf@sfritsch.de>:
Bug acknowledged by developer.
(full text, mbox, link).
Message #73 received at 438855-done@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
With the removal of firebird1.5 from the archive, its security bugs are
no longer a concern.
firebird1.5 is removed as upstream has no intent of providing any kind
of support to it, including security support.
--
dam JabberID: dam@jabber.minus273.org
[signature.asc (application/pgp-signature, inline)]
Bug archived.
Request was from Debbugs Internal Request <owner@bugs.debian.org>
to internal_control@bugs.debian.org.
(Fri, 21 Dec 2007 07:31:07 GMT) (full text, mbox, link).
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Sun Jul 2 03:41:24 2023;
Machine Name:
buxtehude
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.