CVE-2000-1087
CVSS4.6
发布时间 :2001-01-09 00:00:00
修订时间 :2016-10-17 22:08:33
NMCOS    

[原文]The xp_proxiedmetadata function in Microsoft SQL Server 2000 and SQL Server Desktop Engine (MSDE) does not properly restrict the length of a buffer before calling the srv_paraminfo function in the SQL Server API for Extended Stored Procedures (XP), which allows an attacker to cause a denial of service or execute arbitrary commands, aka the "Extended Stored Procedure Parameter Parsing" vulnerability.


[CNNVD]Microsoft SQL Server / Data Engine xp_proxiedmetadata缓冲区溢出漏洞(CNNVD-200101-084)

        Microsoft SQL Server 2000和SQL Server Desktop Engine (MSDE)中的xp_proxiedmetadata函数在调用Extended Stored Procedures (XP)的SQL Server API for中的srv_paraminfo函数之前不正确的限制缓冲区的长度,攻击者利用该漏洞拒绝服务或者执行任意命令,该漏洞又称为"Extended Stored Procedure Parameter Parsing"漏洞。

- CVSS (基础分值)

CVSS分值: 4.6 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:microsoft:sql_server:2000Microsoft SQL Server 2000
cpe:/a:microsoft:data_engine:1.0Microsoft data_engine 1.0
cpe:/a:microsoft:sql_server:7.0Microsoft SQLServer 7.0
cpe:/a:microsoft:data_engine:2000Microsoft data_engine 2000

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1087
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2000-1087
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200101-084
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=97570884410184&w=2
(UNKNOWN)  ATSTAKE  20001201 SQL Server 2000 Extended Stored Procedure Vulnerability
http://www.microsoft.com/technet/security/bulletin/ms00-092.asp
(VENDOR_ADVISORY)  MS  MS00-092
http://www.securityfocus.com/bid/2042
(VENDOR_ADVISORY)  BID  2042

- 漏洞信息

Microsoft SQL Server / Data Engine xp_proxiedmetadata缓冲区溢出漏洞
中危 边界条件错误
2001-01-09 00:00:00 2006-09-01 00:00:00
本地  
        Microsoft SQL Server 2000和SQL Server Desktop Engine (MSDE)中的xp_proxiedmetadata函数在调用Extended Stored Procedures (XP)的SQL Server API for中的srv_paraminfo函数之前不正确的限制缓冲区的长度,攻击者利用该漏洞拒绝服务或者执行任意命令,该漏洞又称为"Extended Stored Procedure Parameter Parsing"漏洞。

- 公告与补丁

        Microsoft has released the following patches which eliminate the vulnerability:
        Microsoft SQL Server 2000
        
        Microsoft SQL Server 7.0
        

- 漏洞信息

10153
Microsoft SQL Server xp_proxiedmetadata Function Overflow
Remote / Network Access Denial of Service, Input Manipulation
Loss of Integrity, Loss of Availability
Exploit Public

- 漏洞描述

A remote overflow exists in SQL Server, SQL Server Desktop Engine and MSDE. The products fail to properly limit the size of allowable input in the second parameter of the xp_proxiedmetadata() function resulting in a buffer overflow. With a specially crafted request, an attacker can cause execution of arbitrary code or a denial of service resulting in a loss of integrity and/or availability.

- 时间线

2000-12-01 Unknow
2000-12-01 Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Microsoft has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

- 漏洞信息

Microsoft SQL Server / Data Engine xp_proxiedmetadata Buffer Overflow Vulnerability
Boundary Condition Error 2042
No Yes
2000-12-01 12:00:00 2009-07-11 03:56:00
Discovered by Chris Anley <dec0de@atstake.com> and publicized in Microsoft Security Bulletin (MS00-092) on December 1, 2000.

- 受影响的程序版本

Microsoft SQL Server 2000
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0
Microsoft SQL Server 7.0
- Microsoft BackOffice 4.5
- Microsoft BackOffice 4.5
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
- Microsoft Windows NT 4.0
Microsoft Data Engine 2000
+ Akiva WebBoard 6.1
+ BindView bv-Admin for Microsoft Exchange
+ BindView bv-Admin for Windows 7.0
+ BindView bv-Admin for Windows Migration
+ BindView bv-control for Active Directory 7.0.2
+ BindView bv-Control for Internet Security 7.0.1
+ BindView bv-Control for Microsoft Exchange 7.0
+ BindView bv-Control for Microsoft SQL Server 7.0.1
+ BindView bv-Control for Microsoft SQL Server 7.0
+ BindView bv-Control for Windows 7.0.2
+ CARI-RUSCO Secure Perfect 3.0
+ CCH Equity Compliance Insider Reporting Module
+ Collins Medical Plus 2000
+ Computer Associates Unicenter
+ Computer Associates Unicenter RC/Update 6.1
+ Computer Associates Unicenter RC/Update 6.0
+ CSIRO BioLink Software 1.5
+ DATA.TXT Corporation Time Matters 4.0
+ DATA.TXT Corporation Time Matters 3.0
+ Dell OpenManage IT Assistant 6.0
+ Dell OpenManage IT Assistant 5.0
+ Express Metrix Express Software Manager 6.0.2
+ Express Metrix Express Software Manager 6.0.1
+ Express Metrix Express Software Manager 6.0
+ Express Metrix Express Software Manager 5.0
+ Fluke Networks Optiview Network Inspector 5.0
+ HP Openview Internet Services 4.5
+ HP Openview Internet Services 4.0
+ HP Openview Operations for Windows 7.1
+ HP Openview Operations for Windows 7.0
+ HP Openview Operations for Windows 6.0
+ HP Openview Reporter 3.0
+ HP Openview Reporter 2.0.2
+ ISI Infortel for Windows 5.4
+ ISI Infortel for Windows 5.2
+ ISI Infortel for Windows 5.1
+ ISI Infortel for Windows 4.0
+ Journyx Timesheet 5.0
+ Journyx Timesheet 4.6
+ Journyx Timesheet 4.5 m3
+ Journyx Timesheet 4.5 m2
+ Journyx Timesheet 4.5
+ Journyx Timesheet 2.0
+ Microsoft .NET Framework 1.1
+ Microsoft .NET Framework 1.0 SP1
+ Microsoft .NET Framework 1.0
+ Microsoft .NET Framework SDK 1.0
+ Microsoft Application Center 2000
+ Microsoft Biztalk Server 2002 Partner Edition 0
+ Microsoft FrontPage 2000 Server Extensions SR 1.3
+ Microsoft FrontPage 2000 Server Extensions SR 1.2
+ Microsoft FrontPage 2000 Server Extensions SR 1.1
+ Microsoft FrontPage 2000 Server Extensions SR 1.0
+ Microsoft Great Plains 5.5.1
+ Microsoft Great Plains 7.0
+ Microsoft Great Plains 5.5
+ Microsoft Great Plains 5.0
+ Microsoft Office 2000 SP2
+ Microsoft Office 2000 SP1
+ Microsoft Office 2000
+ Microsoft Office 2000 Chinese Version
+ Microsoft Office 2000 Japanese Version
+ Microsoft Office 2000 Korean Version
+ Microsoft Office XP SP1
+ Microsoft Office XP
+ Microsoft Office XP Developer Edition
+ Microsoft Project Central Server
+ Microsoft SharePoint Portal Server 2001 SP1
+ Microsoft SharePoint Portal Server 2001
+ Microsoft SharePoint Team Services from Microsoft
+ Microsoft SQL Server 2000 SP3
+ Microsoft SQL Server 2000 SP2
+ Microsoft SQL Server 2000 SP1
+ Microsoft SQL Server 2000
+ Microsoft Visio 2000 Enterprise Edition
+ Microsoft Visio Enterprise Network Tools
+ Microsoft Visual FoxPro 7.0 SP1
+ Microsoft Visual FoxPro 7.0
+ Microsoft Visual FoxPro 6.0
+ Microsoft Visual Studio .NET Academic Edition 0
+ Microsoft Visual Studio .NET Enterprise Architect Edition
+ Microsoft Visual Studio .NET Enterprise Developer Edition
+ Microsoft Visual Studio .NET Professional Edition
+ Microsoft Visual Studio .NET Trial Edition 0
+ Microsoft Windows Server 2003 Standard Edition
+ Microsoft Windows XP Embedded SP1
+ Microsoft Windows XP Embedded
+ MIP NonProfit Series Pro 4.5
+ MIP NonProfit Series Pro 4.4
+ MIP NonProfit Series Pro 4.3
+ NetSupport NetSupport TCO 4.5.1
+ NetSupport NetSupport TCO 4.5
+ Network Associates SupportMagic SQL 4.5
+ Okena StormWatch
+ Peachtree Software Timeslips 11.0
+ Peachtree Software Timeslips 10.0
+ Peachtree Software Timeslips 9.0
+ Peachtree Software Timeslips 9.0
+ Peachtree Software Timeslips 8.0
+ Peachtree Software Timeslips 7.0
+ Peachtree Software Timeslips 6.0
+ QiNetix CommVault Galaxy 4.0.1
+ SalesLogix Corporation SalesLogix 2000.0
+ SmartMax Software MailMax 5.0
+ TeleStream FlipFactory 3.0
+ TeleStream FlipFactory 2.0
+ TeleStream FlipFactory 1.2
+ Veritas Software Backup Exec for Windows Servers 9.0
+ VIGILANTe SecureScan NX 2.5
+ Visionary Systems Firehouse Software 5.4
+ Visionary Systems Firehouse Software 5.0.2 5
+ Visionary Systems Firehouse Software 5.0
+ Visionary Systems Firehouse Software 3.0.5
+ Wonderware InTouch 7.11
+ Xerox CentreWare Web 1.0
Microsoft Data Engine (MSDE) 1.0
+ Affymetrix Microarray Suite Software 5.0.1
+ Affymetrix Microarray Suite Software 5.0.1
+ Affymetrix Microarray Suite Software 5.0.1
+ Affymetrix Microarray Suite Software 5.0
+ Affymetrix Microarray Suite Software 5.0
+ Affymetrix Microarray Suite Software 5.0
+ Altiris Deployment Server 5.5
+ Altiris Deployment Server 5.5
+ Altiris Deployment Server 5.5
+ Altiris Deployment Server 5.0.1
+ Altiris Deployment Server 5.0.1
+ Altiris Deployment Server 5.0.1
+ Centennial UK Ltd Centennial Discovery 4.4
+ Centennial UK Ltd Centennial Discovery 4.4
+ Centennial UK Ltd Centennial Discovery 4.4
+ Compaq Insight Manager 7.0 SP1
+ Compaq Insight Manager 7.0 SP1
+ Compaq Insight Manager 7.0 SP1
+ Compaq Insight Manager 7.0
+ Compaq Insight Manager 7.0
+ Compaq Insight Manager 7.0
+ Gerber Technology WebPDM 3.9
+ Gerber Technology WebPDM 3.9
+ Gerber Technology WebPDM 3.9
+ McAfee ePolicy Orchestrator 2.5 SP1
+ McAfee ePolicy Orchestrator 2.5 SP1
+ McAfee ePolicy Orchestrator 2.5 SP1
+ McAfee ePolicy Orchestrator 2.5
+ McAfee ePolicy Orchestrator 2.5
+ McAfee ePolicy Orchestrator 2.5
+ McAfee ePolicy Orchestrator 2.0
+ McAfee ePolicy Orchestrator 2.0
+ McAfee ePolicy Orchestrator 2.0
+ McAfee ePolicy Orchestrator 1.1
+ McAfee ePolicy Orchestrator 1.1
+ McAfee ePolicy Orchestrator 1.1
+ McAfee ePolicy Orchestrator 1.0
+ McAfee ePolicy Orchestrator 1.0
+ McAfee ePolicy Orchestrator 1.0
- Microsoft Access 2000
- Microsoft Access 2000
- Microsoft Access 2000
- Microsoft Project Central Server
- Microsoft Project Central Server
- Microsoft Project Central Server
+ Microsoft SharePoint Team Services from Microsoft
+ Microsoft SharePoint Team Services from Microsoft
+ Microsoft SharePoint Team Services from Microsoft
- Microsoft Visual Studio 6.0
- Microsoft Visual Studio 6.0
- Microsoft Visual Studio 6.0
+ PowerQuest ControlCenter ST 2.0
+ PowerQuest ControlCenter ST 2.0
+ PowerQuest ControlCenter ST 2.0
+ PPM 2000 Incident Reporting and Investigation Management 5.1
+ PPM 2000 Incident Reporting and Investigation Management 5.1
+ PPM 2000 Incident Reporting and Investigation Management 5.1
+ Research In Motion Blackberry Enterprise Server 2.0 .0.65
+ Research In Motion Blackberry Enterprise Server 2.0 .0.65
+ Research In Motion Blackberry Enterprise Server 2.0 .0.65
+ Trend Micro Control Manager 2.5
+ Trend Micro Control Manager 2.5
+ Trend Micro Control Manager 2.5
+ Trend Micro Damage Cleanup Server 1.0
+ Trend Micro Damage Cleanup Server 1.0
+ Trend Micro Damage Cleanup Server 1.0
+ Vital Processing Services LLC POS-partner 2000 5.0.13
+ Vital Processing Services LLC POS-partner 2000 5.0.13
+ Vital Processing Services LLC POS-partner 2000 5.0.13
+ Vital Processing Services LLC POS-partner 2000 4.1.11
+ Vital Processing Services LLC POS-partner 2000 4.1.11
+ Vital Processing Services LLC POS-partner 2000 4.1.11
+ Websense Reporter 6.3.1
+ Websense Reporter 6.3.1
+ Websense Reporter 6.3.1

- 漏洞讨论

The API Srv_paraminfo(), which is implemented by Extended Stored Procedures (XPs) in Microsoft SQL Server and Data Engine, is susceptible to a buffer overflow vulnerability which may cause the application to fail or arbitrary code to be executed on the target system depending on the data entered into the buffer.

XPs are DLL files that perform high level functions in SQL Server. When called, they invoke a function called Srv_paraminfo() to parse the input parameters.

A vulnerability lies in Srv_paraminfo() and the fact that it does not check the length of the parameter string that an XP passes to it. If an attacker can pass an overly long string to the XP xp_proxiedmetadata, a buffer overflow can occur due to an unsafe memory copy. This can cause SQL Server to crash.

It may also be possible for attackers to execute arbitrary code on the host running SQL Server. The attacker would need to overwrite the return address of the calling function with the address of supplied shellcode in memory. This shellcode would be executed under the context of the account that the SQL Server service was configured to run under. The minimum privilege level that the account would have to possess are SYSTEM privileges.

This vulnerability is confined to those who can successfully log onto the SQL server.

- 漏洞利用

@Stake &lt;researchlabs@atstake.com&gt; has released the following proof-of-concept code:

- 解决方案

Microsoft has released the following patches which eliminate the vulnerability:


Microsoft SQL Server 2000

Microsoft SQL Server 7.0

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站