CVE-2007-5243

Borland Software Interbase - Memory Corruption

Title source: rule

Description

Multiple stack-based buffer overflows in Borland InterBase LI 8.0.0.53 through 8.1.0.253, and WI 5.1.1.680 through 8.1.0.257, allow remote attackers to execute arbitrary code via (1) a long service attach request on TCP port 3050 to the (a) SVC_attach or (b) INET_connect function, (2) a long create request on TCP port 3050 to the (c) isc_create_database or (d) jrd8_create_database function, (3) a long attach request on TCP port 3050 to the (e) isc_attach_database or (f) PWD_db_aliased function, or unspecified vectors involving the (4) jrd8_attach_database or (5) expand_filename2 function.

Exploits (21)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16420
exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16432
exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16440
exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16449
exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16437
exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16447
exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/16839
exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/16843
exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/16844
exploitdb WORKING POC VERIFIED
by Adriano Lima · rubyremotelinux
https://www.exploit-db.com/exploits/10020
exploitdb WORKING POC VERIFIED
by Adriano Lima · rubyremotelinux
https://www.exploit-db.com/exploits/10021
exploitdb WORKING POC VERIFIED
by Adriano Lima · rubyremotelinux
https://www.exploit-db.com/exploits/9954
metasploit WORKING POC GOOD
by Ramon de C Valle · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/misc/ib_isc_attach_database.rb
metasploit WORKING POC GOOD
by Ramon de C Valle · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/misc/ib_isc_create_database.rb
metasploit WORKING POC NORMAL
by Ramon de C Valle · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/misc/fb_svc_attach.rb
metasploit WORKING POC NORMAL
by Ramon de C Valle · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/misc/fb_isc_attach_database.rb
metasploit WORKING POC NORMAL
by Ramon de C Valle · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/misc/fb_isc_create_database.rb
metasploit WORKING POC GOOD
by Ramon de C Valle · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/misc/ib_svc_attach.rb
metasploit WORKING POC GOOD
by Ramon de C Valle · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/misc/ib_pwd_db_aliased.rb
metasploit WORKING POC GOOD
by Ramon de C Valle · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/misc/ib_inet_connect.rb
metasploit WORKING POC GOOD
by Ramon de C Valle · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/misc/ib_jrd8_create_database.rb

Scores

EPSS 0.8295
EPSS Percentile 99.3%

Details

CWE
CWE-119
Status published
Products (17)
borland_software/interbase li_8.0.0.53
borland_software/interbase li_8.0.0.54
borland_software/interbase li_8.0.0.253
borland_software/interbase wi-o6.0.1.6
borland_software/interbase wi-o6.0.2.0
borland_software/interbase wi-v5.1.1.680
borland_software/interbase wi-v5.5.0.742
borland_software/interbase wi-v6.0.0.627
borland_software/interbase wi-v6.0.1.0
borland_software/interbase wi-v6.0.1.6
... and 7 more
Published Oct 06, 2007
Tracked Since Feb 18, 2026