Improper Check for Unusual or Exceptional Conditions Affecting firebird4.0 package, versions <4.0.6.3221.ds6-1


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.05% (17th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN14-FIREBIRD40-11924243
  • published16 Aug 2025
  • disclosed15 Aug 2025

Introduced: 15 Aug 2025

NewCVE-2025-24975  (opens in a new tab)
CWE-754  (opens in a new tab)

How to fix?

Upgrade Debian:14 firebird4.0 to version 4.0.6.3221.ds6-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream firebird4.0 package and not the firebird4.0 package as distributed by Debian. See How to fix? for Debian:14 relevant fixed versions and status.

Firebird is a relational database. Prior to snapshot versions 4.0.6.3183, 5.0.2.1610, and 6.0.0.609, Firebird is vulnerable if ExtConnPoolSize is not set equal to 0. If connections stored in ExtConnPool are not verified for presence and suitability of the CryptCallback interface is used when created versus what is available could result in a segfault in the server process. Encrypted databases, accessed by execute statement on external, may be accessed later by an attachment missing a key to that database. In a case when execute statement are chained, segfault may happen. Additionally, the segfault may affect unencrypted databases. This issue has been patched in snapshot versions 4.0.6.3183, 5.0.2.1610, and 6.0.0.609 and point releases 4.0.6 and 5.0.2. A workaround for this issue involves setting ExtConnPoolSize equal to 0 in firebird.conf.

CVSS Base Scores

version 3.1