<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Information-Leak — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/information-leak/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 17 Apr 2026 18:16:30 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/information-leak/feed.xml" rel="self" type="application/rss+xml"/><item><title>Firebird FB3 Client Library Information Leak (CVE-2025-65104)</title><link>https://feed.craftedsignal.io/briefs/2026-04-firebird-xsqlda-leak/</link><pubDate>Fri, 17 Apr 2026 18:16:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-firebird-xsqlda-leak/</guid><description>Firebird FB3 client library incorrectly handles data lengths when communicating with FB4+ servers, leading to an information leak exploitable by a local attacker.</description><content:encoded><![CDATA[<p>CVE-2025-65104 describes an information leak vulnerability affecting the Firebird open-source relational database management system. The vulnerability exists within the FB3 versions of the client library. When an FB3 client communicates with a Firebird FB4 or higher server, the client library incorrectly places data length values into the XSQLDA (SQL Data Area) fields. This incorrect handling of data lengths can result in an information leak, potentially exposing sensitive data to an attacker with local access. The vulnerability was reported in April 2026. The recommended solution is to upgrade the client library to FB4 or a later version. This vulnerability is significant because it could allow unauthorized access to sensitive information stored within the Firebird database.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains local access to a system with a Firebird FB3 client library installed.</li>
<li>Attacker identifies a Firebird FB4 or higher server to target.</li>
<li>Attacker crafts a malicious SQL query or uses an existing application to interact with the server.</li>
<li>The FB3 client library processes the query and prepares the XSQLDA structure.</li>
<li>Due to the vulnerability, the FB3 client library places incorrect data length values into the XSQLDA fields.</li>
<li>The server responds with data, and the client uses the incorrect length values to interpret the response.</li>
<li>The attacker leverages the incorrect data length values to extract more data than intended, leading to an information leak.</li>
<li>The attacker exfiltrates the leaked information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-65104 results in an information leak. An attacker with local access can potentially extract sensitive data from a Firebird database server. While the exact impact depends on the data stored, it could include user credentials, financial data, or other confidential information. This could lead to further compromise of systems and data. The vulnerability exists because of incorrect data length calculations when FB3 clients communicate with FB4+ servers, which highlights the importance of maintaining up-to-date client libraries.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade all Firebird client libraries to version FB4 or higher to remediate CVE-2025-65104 as recommended by the vendor.</li>
<li>Monitor network connections and process creations involving <code>fbclient.dll</code> or <code>libfbclient.so</code> (depending on the OS) to detect suspicious activity related to Firebird database interactions.</li>
<li>Implement the Sigma rule provided below to detect suspicious process execution related to Firebird clients.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve-2025-65104</category><category>information-leak</category><category>firebird</category></item></channel></rss>