The cumulative patch at
http://www.microsoft.com/technet/treeview/?url=/technet/security/bulletin/MS
02-056.asp addresses 4 vulnerabilities in SQL Server 7 and 2000. Dave
Aitel's (www.immunitysec.com) "hello" bug (unauthenticated  buffer overflow
during authentication) is patched here.

Also addressed is the file overwrite vulnerability discussed here
http://www.nextgenss.com/advisories/mssql-jobs2.txt

The Microsoft advisory states that "operating system" commands can be
inserted into files - the implication being that batch files can be dropped
into startup folders. This is not true for SQL Server 2000. The text of the
file created is UNICODE, i.e. each character taking two bytes with the
second byte being a NULL. This NULL prevents OS commands from being
executed. The risk posed to SQL Server 2000 systems then is file overwrite
such as ntoskrnl.exe

Please note that I have not tested this on SQL Server 7 and what MS says may
be true about being able to run OS commands on this version - I have a
feeling it is not, though.

It is important that the patch be installed as soon as is possible to fix
Dave Aitel's issue but for the file overwrite issue drop public access from
the relevant stored procedures in the interim as a workaround:

revoke execute on sp_add_job from public
revoke execute on sp_add_jobstep from public
revoke execute on sp_add_jobserver from public
revoke execure on sp_start_job from public

Cheers,
David Litchfield
A check for these issues already exists in NGSSQuirreL
(http://www.nextgenss.com/software/ngssquirrel.html ) and an update is being
made now to cover the other two issues.

Reply via email to