CVE-2026-33337 PUBLISHED

Firebird has a buffer overflow when parsing corrupted slice packets

Assigner: GitHub_M
Reserved: 18.03.2026 Published: 17.04.2026 Updated: 17.04.2026

Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, when deserializing a slice packet, the xdr_datum() function does not validate that a cstring length conforms to the slice descriptor bounds, allowing a cstring longer than the allocated buffer to overflow it. An unauthenticated attacker can exploit this by sending a crafted packet to the server, potentially causing a crash or other security impact. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS Score: 7.5

Product Status

Vendor FirebirdSQL
Product firebird
Versions
  • Version >= 3.0.0, < 3.0.14 is affected
  • Version >= 4.0.0, < 4.0.7 is affected
  • Version >= 5.0.0, < 5.0.4 is affected

References

Problem Types

  • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE
  • CWE-502: Deserialization of Untrusted Data CWE