Description
Firebird is an open-source relational database management system. In versions prior to 6.0.0, 5.0.4, 4.0.7 and 3.0.14, when processing an op_slice network packet, the server passes an unprepared structure containing a null pointer to the SDL_info() function, resulting in a null pointer dereference and server crash. An unauthenticated attacker can trigger this by sending a crafted packet to the server port. This issue has been fixed in versions 6.0.0, 5.0.4, 4.0.7 and 3.0.14.
Published: 2026-04-17
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Server Crash
Action: Patch Immediately
AI Analysis

Impact

The vulnerability occurs when the Firebird server processes an op_slice network packet. The server passes an unprepared structure containing a null pointer to the SDL_info() function, which triggers a dereference and causes the server to crash. An attacker does not need authentication; by sending a crafted packet to the server port, the process terminates. The effect is a denial‑of‑service condition; there is no direct compromise of data confidentiality or integrity.

Affected Systems

FirebirdSQL’s Firebird relational database server is impacted. Versions earlier than 6.0.0, 5.0.4, 4.0.7, and 3.0.14 contain the flaw. All releases 6.0.0 and later are considered fixed and not vulnerable.

Risk and Exploitability

A CVSS score of 7.5 classifies this as high severity. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, indicating no documented exploitation to date. The attack vector is a remote, unauthenticated network attacker who can initiate the crash by sending a malformed op_slice packet to the Firebird port without any additional privileges.

Generated by OpenCVE AI on April 18, 2026 at 17:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Firebird to version 6.0.0, 5.0.4, 4.0.7, 3.0.14 or any later release that contains the fix.
  • If an immediate upgrade is not feasible, restrict inbound traffic to the Firebird port to trusted hosts and consider firewall rules that block or drop op_slice packets.
  • Continuously monitor server logs for repeated crashes or abnormal connections, and apply temporary service gating or isolation if the attack persists.

Generated by OpenCVE AI on April 18, 2026 at 17:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 17 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Firebirdsql
Firebirdsql firebird
Vendors & Products Firebirdsql
Firebirdsql firebird

Fri, 17 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
Description Firebird is an open-source relational database management system. In versions prior to 6.0.0, 5.0.4, 4.0.7 and 3.0.14, when processing an op_slice network packet, the server passes an unprepared structure containing a null pointer to the SDL_info() function, resulting in a null pointer dereference and server crash. An unauthenticated attacker can trigger this by sending a crafted packet to the server port. This issue has been fixed in versions 6.0.0, 5.0.4, 4.0.7 and 3.0.14.
Title Firebird has potential server crash via null pointer dereference when processing op_slice packet
Weaknesses CWE-476
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Firebirdsql Firebird
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-17T18:10:29.394Z

Reserved: 2026-02-25T15:28:40.649Z

Link: CVE-2026-28212

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-17T19:16:35.180

Modified: 2026-04-17T19:16:35.180

Link: CVE-2026-28212

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T17:15:05Z

Weaknesses