Microsoft Security Bulletin (MS00-014) - Microsoft has released a patch for a security vulnerability in Microsoft SQL Server 7.0 and Microsoft Data Engine (MSDE) 1.0. The vulnerability allows the remote author of a malicious SQL query to take unauthorized actions on a SQL Server or MSDE database or on the underlying system that was hosting the SQL Server or MSDE database. Microsoft FAQ on this issue available here.
8d650d7fe06feed9d6f924164a526de1a196bb37989f31654e55b160cb9fc6d2
********************************
Microsoft Security Bulletin (MS00-014)
--------------------------------------
Patch Available for "SQL Query Abuse" Vulnerability
Originally Posted: March 08, 2000
Summary
=======
Microsoft has released a patch that eliminates a security vulnerability in
Microsoft® SQL Server 7.0 and Microsoft Data Engine (MSDE) 1.0. The
vulnerability could allow the remote author of a malicious SQL query to
take unauthorized actions on a SQL Server or MSDE database or on the
underlying system that was hosting the SQL Server or MSDE database.
Frequently asked questions regarding this vulnerability and the patch can
be found at
http://www.microsoft.com/technet/security/bulletin/fq00-014.asp
Issue
=====
Microsoft SQL Server 7.0 and MSDE 1.0 perform incomplete argument validation
on certain classes of remotely submitted SQL statements. If a user is able
to submit a particular form of a SQL Select statement to SQL Server or MSDE,
it is possible to take actions on the SQL data base or, if the SQL Server or
MDSE is operating in an account with elevated privileges on the underlying
system, on the underlying operating system itself.
In order to exploit this vulnerability, a user would have to have the right
to submit queries to the SQL Server or MSDE via ODBC, OLE DB, or DB-Library
and be logged on using SQL Server Security. The user would not require any
special privileges beyond the right to submit SQL queries.
Affected Software Versions
==========================
Microsoft SQL Server Version 7.0 and Microsoft Data Engine (MSDE) 1.0.
Patch Availability
==================
- http://www.microsoft.com/downloads/release.asp?ReleaseID=19132
Note: Additional security patches are available at the Microsoft Download
Center
More Information
================
Please see the following references for more information related to this
issue.
- Frequently Asked Questions: Microsoft Security Bulletin MS00-014,
http://www.microsoft.com/technet/security/bulletin/fq00-014.asp.
- As soon as more information on this topic is available, it will be
posted at
http://www.microsoft.com/technet/security/bulletin/ms00-014.asp.
- Microsoft TechNet Security web site,
http://www.microsoft.com/technet/security/default.asp.
Obtaining Support on this Issue
===============================
This is a fully supported patch. Information on contacting Microsoft
Technical Support is available at
http://support.microsoft.com/support/contact/default.asp.
Acknowledgments
===============
Microsoft thanks Sven Hammesfahr http://www.itrain.de for reporting the
SQL Query Abuse vulnerability to us and working with us to protect
customers..
Revisions
=========
- March 08, 2000: Bulletin Created.
THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS"
WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER
EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS
SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN
IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR
LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE
FOREGOING LIMITATION MAY NOT APPLY.
Last updated March 8, 2000
© 2000 Microsoft Corporation. All rights reserved. Terms of use.
*******************************************************************
You have received this e-mail bulletin as a result of your registration
to the Microsoft Product Security Notification Service. You may
unsubscribe from this e-mail notification service at any time by sending
an e-mail to MICROSOFT_SECURITY-SIGNOFF-REQUEST@ANNOUNCE.MICROSOFT.COM
The subject line and message body are not used in processing the request,
and can be anything you like.
For more information on the Microsoft Security Notification Service
please visit http://www.microsoft.com/security/services/bulletin.asp. For
security-related information about Microsoft products, please visit the
Microsoft Security Advisor web site at http://www.microsoft.com/security.