1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

Cumulative Patch for Microsoft SQL Server: July 24

Discussion in 'Networking' started by eddie5659, Jul 24, 2003.

Thread Status:
Not open for further replies.
  1. eddie5659

    eddie5659 Moderator Malware Specialist Thread Starter

    Joined:
    Mar 19, 2001
    Messages:
    32,961
    Hiya

    This is a cumulative patch that includes the functionality of all
    previously released patches for SQL Server 7.0, SQL Server 2000, MSDE
    1.0, and MSDE 2000. In addition, it eliminates three newly discovered
    vulnerabilities.

    - Named Pipe Hijacking -
    Upon system startup, SQL Server creates and listens on a specific
    named pipe for incoming connections to the server. A named pipe is a
    specifically named one-way or two-way channel for communication
    between a pipe server and one or more pipe clients. The named pipe is
    checked for verification of which connection attempts can log on to
    the system running SQL Server to execute queries against data that is
    stored on the server.

    A flaw exists in the checking method for the named pipe that could
    allow an attacker local to the system running SQL Server to hijack
    (gain control of) the named pipe during another client's
    authenticated logon password. This would allow the attacker to gain
    control of the named pipe at the same permission level as the user
    who is attempting to connect. If the user who is attempting to
    connect remotely has a higher level of permissions than the attacker,
    the attacker will assume those rights when the named pipe is
    compromised.

    - Named Pipe Denial of Service -
    In the same named pipes scenario that is mentioned in the "Named Pipe
    Hijacking" section of this bulletin, it is possible for an
    unauthenticated user who is local to the intranet to send a very
    large packet to a specific named pipe on which the system running SQL
    Server is listening and cause it to become unresponsive.

    This vulnerability would not allow an attacker to run arbitrary code
    or elevate their permissions, but it may still be possible for a
    denial of service condition to exist that would require that the
    server be restarted to restore functionality.

    - SQL Server Buffer Overrun -
    A flaw exists in a specific Windows function that may allow an
    authenticated user-with direct access to log on to the system running
    SQL Server-the ability create a specially crafted packet that, when
    sent to the listening local procedure call (LPC) port of the system,
    could cause a buffer overrun.
    If successfully exploited, this could allow a user with limited
    permissions on the system to elevate their permissions to the level
    of the SQL Server service account, or cause arbitrary code to run.



    Maximum Severity Rating: Important

    Affected Software:

    Microsoft SQL Server 7.0
    Microsoft Data Engine (MSDE) 1.0
    Microsoft SQL Server 2000
    Microsoft SQL Server 2000 Desktop Engine (MSDE 2000)
    Microsoft SQL Server 2000 Desktop Engine (Windows


    Download locations for this patch

    Microsoft SQL Server 7.0

    Microsoft SQL 2000 32-bit Edition

    Microsoft SQL 2000 64-bit Edition

    http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS03-031.asp

    Regards

    eddie
     
As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/149572

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice