TUCoPS :: Web :: Apps :: bt1428.txt

Microsoft SQL Server DoS



----- Original Message ----- 
From: "@stake Advisories" <advisories@atstake.com>
To: <bugtraq@securityfocus.com>
Sent: Wednesday, July 23, 2003 1:09 PM
Subject: Microsoft SQL Server DoS


> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
>                              @stake Inc.
>                            www.atstake.com 
> 
>                           Security Advisory
> 
>  
> Advisory Name: Microsoft SQL Server DoS
>  Release Date: 07/23/2003
>   Application: Microsoft SQL Server 7, 2000, MSDE
>      Platform: Windows NT/2000/XP
>      Severity: Denial of Service
>        Author: Andreas Junestam (andreas@atstake.com)
> Vendor Status: Microsoft has patch available
> CVE Candidate: CAN-2003-0231
>     Reference: www.atstake.com/research/advisories/2003/a072303-2.txt
> 
> 
> Overview
> 
> Microsoft SQL Server supports named pipes as one way of communicating
> with the server. This named pipe allows any user to connect and send
> data to it. By sending a large request, an attacker can render the
> service unresponsive. Under some circumstances, the host has to be
> restarted to recover from this situation.
> 
> 
> Detailed Description
> 
> Microsoft SQL Server supports SQL queries over a named pipe. This
> pipe allows write access to the group "Everyone" and is therefor
> accessible to anyone that can authenticate, local or remote. By
> sending a large request to this pipe (size depends on service pack
> level), the service can be rendered unresponsive. The behavior of
> the service depends upon the service pack level.
> 
> SQL Server 2000 pre-SP3:
> The SQL Server service crashes. A restart of the service recovers
> from the situation.
> 
> SQL Server 2000 SP3:
> The SQL Server service appears to be functioning normal (no abnormal
> CPU or memory usage), but it is unresponsive to any type of
> requests. It is also impossible to stop the service and the only way
> to recover from the situation is to restart the host.
> 
> As with most SQL Server issues MSDE is effected.  MSDE is
> included in many Microsoft and non-Microsoft products. A list
> of products that includes MSDE is here:
> 
> http://www.sqlsecurity.com/DesktopDefault.aspx?tabindex=10&tabid=13
> 
> 
> Vendor Response
> 
> Microsoft was contacted on 01/28/2003
> 
> Vendor has a bulletin and a patch available:
> 
> http://www.microsoft.com/technet/security/bulletin/MS03-031.asp
> 
> 
> Recommendation
> 
> Install the vendor patch.
> 
> Disable named pipes as a SQL Server protocol by using the SQL
> Server Network Utility.
> 
> 
> Common Vulnerabilities and Exposures (CVE) Information:
> 
> The Common Vulnerabilities and Exposures (CVE) project has assigned
> the following names to these issues.  These are candidates for
> inclusion in the CVE list (http://cve.mitre.org), which standardizes
> names for security problems.
> 
>   CAN-2003-0231
> 
> 
> @stake Vulnerability Reporting Policy:
> http://www.atstake.com/research/policy/
> 
> @stake Advisory Archive:
> http://www.atstake.com/research/advisories/
> 
> PGP Key:
> http://www.atstake.com/research/pgp_key.asc
> 
> Copyright 2003 @stake, Inc. All rights reserved.
> 
> -----BEGIN PGP SIGNATURE-----
> Version: PGP 8.0
> 
> iQA/AwUBPx75Pke9kNIfAm4yEQIHMQCeOJEDixeR/pv4oLrPXlXotZwiDMUAn1Ea
> BAyScxbEHPoXDHHma1VFKaa/
> =2lzX
> -----END PGP SIGNATURE-----
> 
> 

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH