Feeds

MS SQL Server multiple vulns

Get your daily fixes

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

First up we have a trio of issues, all of which have been fixed with a single cumulative patch. There are two exploitable buffer overrun vulnerabilities, one of which allows an attacker to run arbitrary code, and a registry stuff-up enabling the SQL Server service to write to the registry and specify another account, like LocalSystem, say and have OS-like privies.

The buffer overrun in the authentication and password encryption functions would allow an attacker to execute code in the context of the service account, which the registry exploit could easily escalate. The attacker would have to log on and be able to load and run a query on the server, or be able to pass uncontrolled information into an existing query on the system. The second buffer overflow vuln exists in the bulk insert procedure, which allows data files to be copied into a table. The attacker would have to be a member of the bulk administrators group, which by default has no members. The registry problem allows for privilege escalation, but the changes won't take effect until the service is restarted.

SQL Server 2000 (all editions) and SQL Server Desktop Engine (MSDE) 2000 are affected. The MS bulletin with links to the required patch is posted here.



Next we find that the installation routine for the server and the service packs makes it possible to store unencrypted and poorly-encrypted administrator passwords in the setup.iss and log files (sqlstp.log and/or sqlsp*.log), which can be accessed by nosey third parties other than the admin.

Anyone who can log on to the machine may be able to find the SA password in clear text or ready for some trivial cracking. The fix here is to move the files to a protected directory, or delete them, or run an MS utility called killpwd.exe which will scan the files for passes and delete them.

SQL Server 7, including MSDE 1.0 and SQL Server 2000 are affected. The MS bulletin is posted here. ®

Providing a secure and efficient Helpdesk

More from The Register

next story
Preview redux: Microsoft ships new Windows 10 build with 7,000 changes
Latest bleeding-edge bits borrow Action Center from Windows Phone
Google opens Inbox – email for people too thick to handle email
Print this article out and give it to someone tech-y if you get stuck
Microsoft promises Windows 10 will mean two-factor auth for all
Sneak peek at security features Redmond's baking into new OS
UNIX greybeards threaten Debian fork over systemd plan
'Veteran Unix Admins' fear desktop emphasis is betraying open source
Entity Framework goes 'code first' as Microsoft pulls visual design tool
Visual Studio database diagramming's out the window
Google+ goes TITSUP. But WHO knew? How long? Anyone ... Hello ...
Wobbly Gmail, Contacts, Calendar on the other hand ...
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
Ubuntu 14.10 tries pulling a Steve Ballmer on cloudy offerings
Oi, Windows, centOS and openSUSE – behave, we're all friends here
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.