CVE-2000-1088
CVSS4.6
发布时间 :2001-01-09 00:00:00
修订时间 :2016-10-17 22:08:34
NMCOS    

[原文]The xp_SetSQLSecurity function in Microsoft SQL Server 2000 and SQL Server Desktop Engine (MSDE) does not properly restrict the length of a buffer before calling the srv_paraminfo function in the SQL Server API for Extended Stored Procedures (XP), which allows an attacker to cause a denial of service or execute arbitrary commands, aka the "Extended Stored Procedure Parameter Parsing" vulnerability.


[CNNVD]Microsoft SQL Server/MSDE扩展存储过程远程缓冲区溢出漏洞(MS00-092)(CNNVD-200101-064)

        
        在微软SQL Server 7.0/2000以及MSDE中以及提供了一个API函数srv_paraminfo(),它用来为扩展存储过程调用解释输入参数。由于它没有对输入参数长度进行检查,因此如果输入参数长度超过一定限制,就可能发生缓冲区溢出。任何在调用srv_paraminfo()前没有进行长度检查的扩展存储过程都可能受到此问题影响。
        调用扩展存储过程的语法如下所示:
        exec <存储过程名> <参数1>, <参数2>, ...
        例如,如下的查询将返回"c:\winnt"的目录树:
        exec xp_dirtree 'c:\winnt'
        通过给各个参数传递超长的字符串,有可能覆盖为这些参数所分配的缓冲区并执行任意代码。
        目前已知受影响的扩展存储过程如下:
        1、xp_peekqueue (xpqueue.dll)
         xp_printstatements (xprepl.dll)
        
         给第一个参数传递超长的串将导致非法操作并覆盖异常处理程序所保存的返回地址。
        2、xp_proxiedmetadata (xprepl.dll)
         该存储过程使用4个参数。给第二个参数传递超长的串将导致非法操作并覆盖异常处理程序所保存的返回地址。
        
        3、xp_SetSQLSecurity (xpstar.dll)
         该存储过程使用4个参数。给第三个参数传递超长的串将引发异常并导致整个SQL Server进程立即终止。
        
        4、xp_displayparamstmt(xprepl.dll)
         xp_enumresultset(xprepl.dll)
         xp_showcolv (xprepl.dll)
         xp_updatecolvbm (xprepl.dll)
        
         给第一个参数传递超长的串将导致非法操作并覆盖异常处理程序所保存的返回地址。
        
        扩展存储过程可以被任何客户组件调用,只要这些客户组件能够执行普通的SQLServer查询,比如Microsoft Access或者MSQuery。SQL Server中提供的ISQL实用程序也可以用来调用扩展存储过程。运行于IIS之上的web应用程序频繁地使用ADO(ActiveX Data Objects)API来连接SQL Server数据库。
        攻击者可能通过两种途径进行攻击:
        1. 如果攻击者可以登录进入SQL Server数据库,就可以通过直接调用有问题的扩展存储过程来进行攻击。如果溢出成功,可能获取SYSTEM权限。
        2. 攻击者也可能通过Web应用程序来进行攻击,但是需要攻击者了解应用程序在何处调用了有问题的扩展存储过程,同时提供有效的参数。
        

- CVSS (基础分值)

CVSS分值: 4.6 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:microsoft:sql_server:2000Microsoft SQL Server 2000
cpe:/a:microsoft:data_engine:1.0Microsoft data_engine 1.0
cpe:/a:microsoft:sql_server:7.0Microsoft SQLServer 7.0
cpe:/a:microsoft:data_engine:2000Microsoft data_engine 2000

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1088
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2000-1088
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200101-064
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=97570884410184&w=2
(UNKNOWN)  ATSTAKE  20001201 SQL Server 2000 Extended Stored Procedure Vulnerability
http://www.microsoft.com/technet/security/bulletin/ms00-092.asp
(VENDOR_ADVISORY)  MS  MS00-092
http://www.securityfocus.com/bid/2043
(VENDOR_ADVISORY)  BID  2043

- 漏洞信息

Microsoft SQL Server/MSDE扩展存储过程远程缓冲区溢出漏洞(MS00-092)
中危 边界条件错误
2001-01-09 00:00:00 2006-09-01 00:00:00
本地  
        
        在微软SQL Server 7.0/2000以及MSDE中以及提供了一个API函数srv_paraminfo(),它用来为扩展存储过程调用解释输入参数。由于它没有对输入参数长度进行检查,因此如果输入参数长度超过一定限制,就可能发生缓冲区溢出。任何在调用srv_paraminfo()前没有进行长度检查的扩展存储过程都可能受到此问题影响。
        调用扩展存储过程的语法如下所示:
        exec <存储过程名> <参数1>, <参数2>, ...
        例如,如下的查询将返回"c:\winnt"的目录树:
        exec xp_dirtree 'c:\winnt'
        通过给各个参数传递超长的字符串,有可能覆盖为这些参数所分配的缓冲区并执行任意代码。
        目前已知受影响的扩展存储过程如下:
        1、xp_peekqueue (xpqueue.dll)
         xp_printstatements (xprepl.dll)
        
         给第一个参数传递超长的串将导致非法操作并覆盖异常处理程序所保存的返回地址。
        2、xp_proxiedmetadata (xprepl.dll)
         该存储过程使用4个参数。给第二个参数传递超长的串将导致非法操作并覆盖异常处理程序所保存的返回地址。
        
        3、xp_SetSQLSecurity (xpstar.dll)
         该存储过程使用4个参数。给第三个参数传递超长的串将引发异常并导致整个SQL Server进程立即终止。
        
        4、xp_displayparamstmt(xprepl.dll)
         xp_enumresultset(xprepl.dll)
         xp_showcolv (xprepl.dll)
         xp_updatecolvbm (xprepl.dll)
        
         给第一个参数传递超长的串将导致非法操作并覆盖异常处理程序所保存的返回地址。
        
        扩展存储过程可以被任何客户组件调用,只要这些客户组件能够执行普通的SQLServer查询,比如Microsoft Access或者MSQuery。SQL Server中提供的ISQL实用程序也可以用来调用扩展存储过程。运行于IIS之上的web应用程序频繁地使用ADO(ActiveX Data Objects)API来连接SQL Server数据库。
        攻击者可能通过两种途径进行攻击:
        1. 如果攻击者可以登录进入SQL Server数据库,就可以通过直接调用有问题的扩展存储过程来进行攻击。如果溢出成功,可能获取SYSTEM权限。
        2. 攻击者也可能通过Web应用程序来进行攻击,但是需要攻击者了解应用程序在何处调用了有问题的扩展存储过程,同时提供有效的参数。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 数据库管理员应该限制这些有问题的存储过程的访问权限,只允许数据库管理员访问。
        厂商补丁:
        Microsoft
        ---------
        Microsoft已经为此发布了一个安全公告(MS00-092)以及相应补丁:
        MS00-092:Patch Available for "Extended Stored Procedure Parameter Parsing" Vulnerability
        链接:
        http://www.microsoft.com/technet/security/bulletin/MS00-092.asp

        补丁下载:
        
        http://support.microsoft.com/support/sql/xp_security.asp

- 漏洞信息

10154
Microsoft SQL Server xp_SetSQLSecurity Function Overflow
Remote / Network Access Denial of Service, Input Manipulation
Loss of Integrity, Loss of Availability
Exploit Public

- 漏洞描述

A remote overflow exists in SQL Server, SQL Server Desktop Engine and MSDE. The products fail to properly limit the size of allowable input in the third parameter of the xp_SetSQLSecurity() function resulting in a buffer overflow. With a specially crafted request, an attacker can cause execution of arbitrary code or a denial of service resulting in a loss of integrity and/or availability.

- 时间线

2000-12-01 Unknow
2000-12-01 Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Microsoft has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

- 漏洞信息

Microsoft SQL Server / Data Engine xp_SetSQLSecurity Buffer Overflow Vulnerability
Boundary Condition Error 2043
No Yes
2000-12-01 12:00:00 2009-07-11 03:56:00
Discovered by Chris Anley <dec0de@atstake.com> and publicized in Microsoft Security Bulletin (MS00-092) on December 1, 2000.

- 受影响的程序版本

Microsoft SQL Server 2000
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0
Microsoft SQL Server 7.0
- Microsoft BackOffice 4.5
- Microsoft BackOffice 4.5
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
- Microsoft Windows NT 4.0
Microsoft Data Engine 2000
+ Akiva WebBoard 6.1
+ BindView bv-Admin for Microsoft Exchange
+ BindView bv-Admin for Windows 7.0
+ BindView bv-Admin for Windows Migration
+ BindView bv-control for Active Directory 7.0.2
+ BindView bv-Control for Internet Security 7.0.1
+ BindView bv-Control for Microsoft Exchange 7.0
+ BindView bv-Control for Microsoft SQL Server 7.0.1
+ BindView bv-Control for Microsoft SQL Server 7.0
+ BindView bv-Control for Windows 7.0.2
+ CARI-RUSCO Secure Perfect 3.0
+ CCH Equity Compliance Insider Reporting Module
+ Collins Medical Plus 2000
+ Computer Associates Unicenter
+ Computer Associates Unicenter RC/Update 6.1
+ Computer Associates Unicenter RC/Update 6.0
+ CSIRO BioLink Software 1.5
+ DATA.TXT Corporation Time Matters 4.0
+ DATA.TXT Corporation Time Matters 3.0
+ Dell OpenManage IT Assistant 6.0
+ Dell OpenManage IT Assistant 5.0
+ Express Metrix Express Software Manager 6.0.2
+ Express Metrix Express Software Manager 6.0.1
+ Express Metrix Express Software Manager 6.0
+ Express Metrix Express Software Manager 5.0
+ Fluke Networks Optiview Network Inspector 5.0
+ HP Openview Internet Services 4.5
+ HP Openview Internet Services 4.0
+ HP Openview Operations for Windows 7.1
+ HP Openview Operations for Windows 7.0
+ HP Openview Operations for Windows 6.0
+ HP Openview Reporter 3.0
+ HP Openview Reporter 2.0.2
+ ISI Infortel for Windows 5.4
+ ISI Infortel for Windows 5.2
+ ISI Infortel for Windows 5.1
+ ISI Infortel for Windows 4.0
+ Journyx Timesheet 5.0
+ Journyx Timesheet 4.6
+ Journyx Timesheet 4.5 m3
+ Journyx Timesheet 4.5 m2
+ Journyx Timesheet 4.5
+ Journyx Timesheet 2.0
+ Microsoft .NET Framework 1.1
+ Microsoft .NET Framework 1.0 SP1
+ Microsoft .NET Framework 1.0
+ Microsoft .NET Framework SDK 1.0
+ Microsoft Application Center 2000
+ Microsoft Biztalk Server 2002 Partner Edition 0
+ Microsoft FrontPage 2000 Server Extensions SR 1.3
+ Microsoft FrontPage 2000 Server Extensions SR 1.2
+ Microsoft FrontPage 2000 Server Extensions SR 1.1
+ Microsoft FrontPage 2000 Server Extensions SR 1.0
+ Microsoft Great Plains 5.5.1
+ Microsoft Great Plains 7.0
+ Microsoft Great Plains 5.5
+ Microsoft Great Plains 5.0
+ Microsoft Office 2000 SP2
+ Microsoft Office 2000 SP1
+ Microsoft Office 2000
+ Microsoft Office 2000 Chinese Version
+ Microsoft Office 2000 Japanese Version
+ Microsoft Office 2000 Korean Version
+ Microsoft Office XP SP1
+ Microsoft Office XP
+ Microsoft Office XP Developer Edition
+ Microsoft Project Central Server
+ Microsoft SharePoint Portal Server 2001 SP1
+ Microsoft SharePoint Portal Server 2001
+ Microsoft SharePoint Team Services from Microsoft
+ Microsoft SQL Server 2000 SP3
+ Microsoft SQL Server 2000 SP2
+ Microsoft SQL Server 2000 SP1
+ Microsoft SQL Server 2000
+ Microsoft Visio 2000 Enterprise Edition
+ Microsoft Visio Enterprise Network Tools
+ Microsoft Visual FoxPro 7.0 SP1
+ Microsoft Visual FoxPro 7.0
+ Microsoft Visual FoxPro 6.0
+ Microsoft Visual Studio .NET Academic Edition 0
+ Microsoft Visual Studio .NET Enterprise Architect Edition
+ Microsoft Visual Studio .NET Enterprise Developer Edition
+ Microsoft Visual Studio .NET Professional Edition
+ Microsoft Visual Studio .NET Trial Edition 0
+ Microsoft Windows Server 2003 Standard Edition
+ Microsoft Windows XP Embedded SP1
+ Microsoft Windows XP Embedded
+ MIP NonProfit Series Pro 4.5
+ MIP NonProfit Series Pro 4.4
+ MIP NonProfit Series Pro 4.3
+ NetSupport NetSupport TCO 4.5.1
+ NetSupport NetSupport TCO 4.5
+ Network Associates SupportMagic SQL 4.5
+ Okena StormWatch
+ Peachtree Software Timeslips 11.0
+ Peachtree Software Timeslips 10.0
+ Peachtree Software Timeslips 9.0
+ Peachtree Software Timeslips 9.0
+ Peachtree Software Timeslips 8.0
+ Peachtree Software Timeslips 7.0
+ Peachtree Software Timeslips 6.0
+ QiNetix CommVault Galaxy 4.0.1
+ SalesLogix Corporation SalesLogix 2000.0
+ SmartMax Software MailMax 5.0
+ TeleStream FlipFactory 3.0
+ TeleStream FlipFactory 2.0
+ TeleStream FlipFactory 1.2
+ Veritas Software Backup Exec for Windows Servers 9.0
+ VIGILANTe SecureScan NX 2.5
+ Visionary Systems Firehouse Software 5.4
+ Visionary Systems Firehouse Software 5.0.2 5
+ Visionary Systems Firehouse Software 5.0
+ Visionary Systems Firehouse Software 3.0.5
+ Wonderware InTouch 7.11
+ Xerox CentreWare Web 1.0
Microsoft Data Engine (MSDE) 1.0
+ Affymetrix Microarray Suite Software 5.0.1
+ Affymetrix Microarray Suite Software 5.0.1
+ Affymetrix Microarray Suite Software 5.0.1
+ Affymetrix Microarray Suite Software 5.0
+ Affymetrix Microarray Suite Software 5.0
+ Affymetrix Microarray Suite Software 5.0
+ Altiris Deployment Server 5.5
+ Altiris Deployment Server 5.5
+ Altiris Deployment Server 5.5
+ Altiris Deployment Server 5.0.1
+ Altiris Deployment Server 5.0.1
+ Altiris Deployment Server 5.0.1
+ Centennial UK Ltd Centennial Discovery 4.4
+ Centennial UK Ltd Centennial Discovery 4.4
+ Centennial UK Ltd Centennial Discovery 4.4
+ Compaq Insight Manager 7.0 SP1
+ Compaq Insight Manager 7.0 SP1
+ Compaq Insight Manager 7.0 SP1
+ Compaq Insight Manager 7.0
+ Compaq Insight Manager 7.0
+ Compaq Insight Manager 7.0
+ Gerber Technology WebPDM 3.9
+ Gerber Technology WebPDM 3.9
+ Gerber Technology WebPDM 3.9
+ McAfee ePolicy Orchestrator 2.5 SP1
+ McAfee ePolicy Orchestrator 2.5 SP1
+ McAfee ePolicy Orchestrator 2.5 SP1
+ McAfee ePolicy Orchestrator 2.5
+ McAfee ePolicy Orchestrator 2.5
+ McAfee ePolicy Orchestrator 2.5
+ McAfee ePolicy Orchestrator 2.0
+ McAfee ePolicy Orchestrator 2.0
+ McAfee ePolicy Orchestrator 2.0
+ McAfee ePolicy Orchestrator 1.1
+ McAfee ePolicy Orchestrator 1.1
+ McAfee ePolicy Orchestrator 1.1
+ McAfee ePolicy Orchestrator 1.0
+ McAfee ePolicy Orchestrator 1.0
+ McAfee ePolicy Orchestrator 1.0
- Microsoft Access 2000
- Microsoft Access 2000
- Microsoft Access 2000
- Microsoft Project Central Server
- Microsoft Project Central Server
- Microsoft Project Central Server
+ Microsoft SharePoint Team Services from Microsoft
+ Microsoft SharePoint Team Services from Microsoft
+ Microsoft SharePoint Team Services from Microsoft
- Microsoft Visual Studio 6.0
- Microsoft Visual Studio 6.0
- Microsoft Visual Studio 6.0
+ PowerQuest ControlCenter ST 2.0
+ PowerQuest ControlCenter ST 2.0
+ PowerQuest ControlCenter ST 2.0
+ PPM 2000 Incident Reporting and Investigation Management 5.1
+ PPM 2000 Incident Reporting and Investigation Management 5.1
+ PPM 2000 Incident Reporting and Investigation Management 5.1
+ Research In Motion Blackberry Enterprise Server 2.0 .0.65
+ Research In Motion Blackberry Enterprise Server 2.0 .0.65
+ Research In Motion Blackberry Enterprise Server 2.0 .0.65
+ Trend Micro Control Manager 2.5
+ Trend Micro Control Manager 2.5
+ Trend Micro Control Manager 2.5
+ Trend Micro Damage Cleanup Server 1.0
+ Trend Micro Damage Cleanup Server 1.0
+ Trend Micro Damage Cleanup Server 1.0
+ Vital Processing Services LLC POS-partner 2000 5.0.13
+ Vital Processing Services LLC POS-partner 2000 5.0.13
+ Vital Processing Services LLC POS-partner 2000 5.0.13
+ Vital Processing Services LLC POS-partner 2000 4.1.11
+ Vital Processing Services LLC POS-partner 2000 4.1.11
+ Vital Processing Services LLC POS-partner 2000 4.1.11
+ Websense Reporter 6.3.1
+ Websense Reporter 6.3.1
+ Websense Reporter 6.3.1

- 漏洞讨论

The API Srv_paraminfo(), which is implemented by Extended Stored Procedures (XPs) in Microsoft SQL Server and Data Engine, is susceptible to a buffer overflow vulnerability which may cause the application to fail or arbitrary code to be executed on the target system depending on the data entered into the buffer.

XPs are DLL files that perform high level functions in SQL Server. When called, they invoke a function called Srv_paraminfo() to parse the input parameters.

A vulnerability lies in Srv_paraminfo() and the fact that it does not check the length of the parameter string that an XP passes to it. If an attacker can pass an overly long string to the XP xp_SetSQLSecurity, a buffer overflow can occur due to an unsafe memory copy. This can cause SQL Server to crash.

It may also be possible for attackers to execute arbitrary code on the host running SQL Server. The attacker would need to overwrite the return address of the calling function with the address of supplied shellcode in memory. This shellcode would be executed under the context of the account that the SQL Server service was configured to run under. The minimum privilege level that the account would have to possess are SYSTEM privileges.

This vulnerability is confined to those who can successfully log onto the SQL server.

- 漏洞利用

@Stake &lt;researchlabs@atstake.com&gt; has released the following proof-of-concept code:

- 解决方案

Microsoft has released the following patches which eliminate the vulnerability:


Microsoft SQL Server 2000

Microsoft SQL Server 7.0

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站