1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

SQL Server Vulnerability : Dec 21

Discussion in 'Web & Email' started by eddie5659, Dec 21, 2001.

Thread Status:
Not open for further replies.
  1. eddie5659

    eddie5659 Moderator Malware Specialist Thread Starter

    Mar 19, 2001

    SQL Server 7.0 and 2000 provide a number of functions that enable
    database queries to generate text messages. In some cases, the
    functions create a text message and store it in a variable; in
    others, the functions directly display the message. Two
    vulnerabilities associated with these functions have been discovered.

    The first vulnerability results because of a flaw in the functions
    themselves. Several of the functions don't adequately verify that the
    requested text will fit into the buffer that's supplied to hold it. A
    buffer overrun could occur as a result, and could be used either to
    run code in the security context of the SQL Server service or to
    cause the SQL Server service to fail. SQL Server can be configured to
    run in various security contexts, and by default runs as a domain
    user. The precise privileges the attacker could gain would depend on
    the specific security context that the service runs in.

    The second vulnerability results because of a format string
    vulnerability in the C runtime functions that the SQL Server
    functions call when installed on Windows NT(r) 4.0, Windows(r) 2000
    or Windows XP. Although format string vulnerabilities often can be
    exploited to run code of the attacker's choice, that is not true in
    this case. Because of the specific way this vulnerability occurs, the
    C Runtime code would always be overrun with the same values
    regardless of the attacker's inputs. As a result, this vulnerability
    could only be used as a denial of service.

    An attacker could exploit the vulnerabilities in either of two ways.
    The most direct way would be for the attacker to simply load and
    execute a database query that calls one of the affected functions.
    Alternatively, if a web site or other database front-end would accept
    and process arbitrary queries, it could be possible for the attacker
    to provide inputs that would cause the query to call an affected
    function with the appropriate parameters.

    Because the two vulnerabilities have different root causes, there are
    separate patches for each. Microsoft recommends that the SQL Server
    patch be applied to all affected servers. However, we recommend that
    customers carefully weigh whether they need to apply the C runtime
    patch. We make this recommendation for two reasons:

    The C runtime vulnerability only allows denial of service attacks, so
    the threat it poses is somewhat lower.
    The C runtime plays a crucial role in the operating system itself.
    While we are confident that both patches are well-tested, if there
    were a regression error in the C runtime, the effects would likely be
    serious and widespread.

    Microsoft SQL Server 7.0
    Microsoft SQL Server 2000



  2. SavvyLady


    Oct 14, 2001
As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/62499

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice