[Am-info] Microsoft SQL Server Remote Buffer Overflow Vulnerability
Fred A. Miller
fm@cupserv.org
Tue, 13 Aug 2002 13:38:47 -0400
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Microsoft SQL Server Remote Buffer Overflow Vulnerability
BugTraq ID: 5411
Remote: Yes
Date Published: Aug 06 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/5411
Summary:
A vulnerability has been discovered in Microsoft SQL Server that could
make it possible for remote attackers to gain access to target hosts.
It is possible for an attacker to cause a buffer overflow condition on=20
the vulnerable SQL server.
This vulnerability reportedly occurs even before authentication can
proceed. Reportedly, this is due to a default system configuration.
Microsoft SQL Server listens for connections on TCP port 1433.
An attacker can exploit this vulnerability by sending specially crafted
packets to TCP port 1433 which causes SQL Server to crash and possibly
execute attacker supplied code.
It is not known which versions of SQL Server are vulnerable. This BID=20
will be updated as further information becomes available.
It is possible that this issue may be remotely exploitable to execute
arbitrary code as a system process, possibly leading to local access to
the vulnerable system.
- --=20
Fred A. Miller
Systems Administrator
Cornell Univ. Press Services
fm@cupserv.org, www.cupserv.org
- --- SuSE Linux v8.0 Pro, KMail 3.0.1---
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iEYEARECAAYFAj1ZRCcACgkQB9vk4ichYXc0IQCdFO7S9JUSP0l/xd6NXa4HChcA
AIUAoLWlls0mHLVY0hJrwXEfe0MjqHR7
=3DBFem
-----END PGP SIGNATURE-----