Summary
Detail | |||
---|---|---|---|
Vendor | Microsoft | First view | 2002-03-08 |
Product | Sql Server | Last view | 2012-09-25 |
Version | 2000 | Type | Application |
Update | sp1 | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:microsoft:sql_server |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
4.3 | 2012-09-25 | CVE-2012-4015 | Cross-site scripting (XSS) vulnerability in the management screen in myLittleTools myLittleAdmin for SQL Server 2000 allows remote attackers to inject arbitrary web script or HTML via vectors that trigger a crafted database entry. |
7.2 | 2003-08-27 | CVE-2003-0232 | Microsoft SQL Server 7, 2000, and MSDE allows local users to execute arbitrary code via a certain request to the Local Procedure Calls (LPC) port that leads to a buffer overflow. |
5 | 2003-08-27 | CVE-2003-0231 | Microsoft SQL Server 7, 2000, and MSDE allows local or remote authenticated users to cause a denial of service (crash or hang) via a long request to a named pipe. |
7.2 | 2003-08-27 | CVE-2003-0230 | Microsoft SQL Server 7, 2000, and MSDE allows local users to gain privileges by hijacking a named pipe during the authentication of another user, aka the "Named Pipe Hijacking" vulnerability. |
5 | 2002-12-31 | CVE-2002-1981 | Microsoft SQL Server 2000 through SQL Server 2000 SP2 allows the "public" role to execute the (1) sp_MSSetServerProperties or (2) sp_MSsetalertinfo stored procedures, which allows attackers to modify configuration including SQL server startup and alert settings. |
5 | 2002-12-31 | CVE-2002-1872 | Microsoft SQL Server 6.0 through 2000, with SQL Authentication enabled, uses weak password encryption (XOR), which allows remote attackers to sniff and decrypt the password. |
10 | 2002-10-28 | CVE-2002-1145 | The xp_runwebtask stored procedure in the Web Tasks component of Microsoft SQL Server 7.0 and 2000, Microsoft Data Engine (MSDE) 1.0, and Microsoft Desktop Engine (MSDE) 2000 can be executed by PUBLIC, which allows an attacker to gain privileges by updating a webtask that is owned by the database owner through the msdb.dbo.mswebtasks table, which does not have strong permissions. |
7.5 | 2002-10-11 | CVE-2002-1138 | Microsoft SQL Server 7.0 and 2000, including Microsoft Data Engine (MSDE) 1.0 and Microsoft Desktop Engine (MSDE) 2000, writes output files for scheduled jobs under its own privileges instead of the entity that launched it, which allows attackers to overwrite system files, aka "Flaw in Output File Handling for Scheduled Jobs." |
7.5 | 2002-10-11 | CVE-2002-1137 | Buffer overflow in the Database Console Command (DBCC) that handles user inputs in Microsoft SQL Server 7.0 and 2000, including Microsoft Data Engine (MSDE) 1.0 and Microsoft Desktop Engine (MSDE) 2000, allows attackers to execute arbitrary code via a long SourceDB argument in a "non-SQL OLEDB data source" such as FoxPro, a variant of CAN-2002-0644. |
7.5 | 2002-09-24 | CVE-2002-1123 | Buffer overflow in the authentication function for Microsoft SQL Server 2000 and Microsoft Desktop Engine (MSDE) 2000 allows remote attackers to execute arbitrary code via a long request to TCP port 1433, aka the "Hello" overflow. |
7.5 | 2002-09-05 | CVE-2002-0859 | Buffer overflow in the OpenDataSource function of the Jet engine on Microsoft SQL Server 2000 allows remote attackers to execute arbitrary code. |
10 | 2002-09-05 | CVE-2002-0721 | Microsoft SQL Server 7.0 and 2000 installs with weak permissions for extended stored procedures that are associated with helper functions, which could allow unprivileged users, and possibly remote attackers, to run stored procedures with administrator privileges via (1) xp_execresultset, (2) xp_printstatements, or (3) xp_displayparamstmt. |
5 | 2002-08-12 | CVE-2002-0650 | The keep-alive mechanism for Microsoft SQL Server 2000 allows remote attackers to cause a denial of service (bandwidth consumption) via a "ping" style packet to the Resolution Service (UDP port 1434) with a spoofed IP address of another SQL Server system, which causes the two servers to exchange packets in an infinite loop. |
7.5 | 2002-08-12 | CVE-2002-0649 | Multiple buffer overflows in the Resolution Service for Microsoft SQL Server 2000 and Microsoft Desktop Engine 2000 (MSDE) allow remote attackers to cause a denial of service or execute arbitrary code via UDP packets to port 1434 in which (1) a 0x04 byte that causes the SQL Monitor thread to generate a long registry key name, or (2) a 0x08 byte with a long string causes heap corruption, as exploited by the Slammer/Sapphire worm. |
4.6 | 2002-07-23 | CVE-2002-0643 | The installation of Microsoft Data Engine 1.0 (MSDE 1.0), and Microsoft SQL Server 2000 creates setup.iss files with insecure permissions and does not delete them after installation, which allows local users to obtain sensitive data, including weakly encrypted passwords, to gain privileges, aka "SQL Server Installation Process May Leave Passwords on System." |
7.5 | 2002-07-03 | CVE-2002-0187 | Cross-site scripting vulnerability in the SQLXML component of Microsoft SQL Server 2000 allows an attacker to execute arbitrary script via the root parameter as part of an XML SQL query, aka "Script Injection via XML Tag." |
7.5 | 2002-07-03 | CVE-2002-0186 | Buffer overflow in the SQLXML ISAPI extension of Microsoft SQL Server 2000 allows remote attackers to execute arbitrary code via data queries with a long content-type parameter, aka "Unchecked Buffer in SQLXML ISAPI Extension." |
5 | 2002-05-16 | CVE-2002-0224 | The MSDTC (Microsoft Distributed Transaction Service Coordinator) for Microsoft Windows 2000, Microsoft IIS 5.0 and SQL Server 6.5 through SQL 2000 0.0 allows remote attackers to cause a denial of service (crash or hang) via malformed (random) input. |
7.5 | 2002-05-16 | CVE-2002-0154 | Buffer overflows in extended stored procedures for Microsoft SQL Server 7.0 and 2000 allow remote attackers to cause a denial of service or execute arbitrary code via a database query with certain long arguments. |
5 | 2002-03-08 | CVE-2002-0057 | XMLHTTP control in Microsoft XML Core Services 2.6 and later does not properly handle IE Security Zone settings, which allows remote attackers to read arbitrary files by specifying a local file as an XML Data Source. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
33% (1) | CWE-264 | Permissions, Privileges, and Access Controls |
33% (1) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
33% (1) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
CAPEC : Common Attack Pattern Enumeration & Classification
id | Name |
---|---|
CAPEC-20 | Encryption Brute Forcing |
CAPEC-58 | Restful Privilege Elevation |
CAPEC-112 | Brute Force |
SAINT Exploits
Description | Link |
---|---|
Microsoft SQL Server Hello buffer overflow | More info here |
Microsoft SQL Server 2000 resolution service buffer overflow | More info here |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
60004 | Microsoft SQL Server Multiple Stored Procedure Unprivileged Configuration Man... |
59636 | Microsoft SQL Server SQL Authentication Password Encryption Weakness |
13434 | Microsoft Windows Distributed Transaction Coordinator (DTC) Malformed Input DoS |
10159 | Microsoft SQL Server Multiple Extended Stored Procedure Overflows |
10141 | Microsoft SQL Server sestup.iss File Authentication Credential Disclosure |
10139 | Microsoft SQL Server Agent Arbitrary File Creation |
10138 | Microsoft SQL Server xp_displayparamstmt Procedure Privilege Escalation |
10137 | Microsoft SQL Server xp_printstatements Procedure Privilege Escalation |
10136 | Microsoft SQL Server xp_execresultset Procedure Privilege Escalation |
10132 | Microsoft SQL Server Authentication Function Remote Overflow |
10131 | Microsoft SQL Server DBCC SourceDB Argument Arbitrary Command Execution |
10127 | Microsoft SQL Server xp_runwebtask Procedure Privilege Escalation |
10125 | Microsoft SQL Server Named Pipe Hijack Privilege Escalation |
10123 | Microsoft SQL Server LPC Packet Handling Local Overflow |
5347 | Microsoft SQL Server SQLXML ISAPI Extension Remote Overflow |
5343 | Microsoft SQL Server SQLXML root Parameter XSS |
5064 | Microsoft SQL Server Jet Engine OpenDataSource Function Overflow |
4578 | Microsoft SQL Resolution Service Monitor Thread Registry Key Name Overflow |
4577 | Microsoft SQL Resolution Service 0x08 Byte Long String Overflow |
3032 | Microsoft IE XMLHTTP Control Arbitrary Remote File Access |
2299 | Microsoft SQL Server Named Pipe Handling Request Remote DoS |
878 | Microsoft SQL Resolution Service Keep-Alive Function DoS |
OpenVAS Exploits
id | Description |
---|---|
2006-03-26 | Name : Microsoft's SQL Version Query File : nvt/mssql_version.nasl |
2005-11-03 | Name : MSDTC denial of service by flooding with nul bytes File : nvt/msdtc_dos.nasl |
2005-11-03 | Name : Microsoft's SQL Hello Overflow File : nvt/mssql_hello_overflow.nasl |
2005-11-03 | Name : XML Core Services patch (Q318203) File : nvt/smb_nt_ms02-008.nasl |
2005-11-03 | Name : Cumulative Patch for Internet Information Services (Q327696) File : nvt/smb_nt_ms02-018.nasl |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | heap-based overflow attempt RuleID : 4990 - Type : SERVER-MSSQL - Revision : 13 |
2014-01-10 | heap-based overflow attempt RuleID : 4989 - Type : SERVER-MSSQL - Revision : 9 |
2014-01-10 | SQLXML content type overflow RuleID : 3150-community - Type : SERVER-IIS - Revision : 14 |
2014-01-10 | SQLXML content type overflow RuleID : 3150 - Type : SERVER-IIS - Revision : 14 |
2014-01-10 | SQL Slammer worm propagation attempt inbound RuleID : 28555-community - Type : MALWARE-OTHER - Revision : 2 |
2014-01-10 | SQL Slammer worm propagation attempt inbound RuleID : 28555 - Type : MALWARE-OTHER - Revision : 2 |
2014-01-10 | version overflow attempt RuleID : 2050-community - Type : SERVER-MSSQL - Revision : 19 |
2014-01-10 | version overflow attempt RuleID : 2050 - Type : SERVER-MSSQL - Revision : 19 |
2014-01-10 | Worm propagation attempt OUTBOUND RuleID : 2004-community - Type : SQL - Revision : 15 |
2014-01-10 | Worm propagation attempt OUTBOUND RuleID : 2004 - Type : SQL - Revision : 15 |
2014-01-10 | Worm propagation attempt RuleID : 2003-community - Type : SQL - Revision : 16 |
2014-01-10 | Worm propagation attempt RuleID : 2003 - Type : SQL - Revision : 16 |
2014-01-10 | MSDTC attempt RuleID : 1408-community - Type : SERVER-OTHER - Revision : 17 |
2014-01-10 | MSDTC attempt RuleID : 1408 - Type : SERVER-OTHER - Revision : 17 |
2014-01-10 | Microsoft SQL Server 2000 Server hello buffer overflow attempt RuleID : 11264 - Type : SERVER-MSSQL - Revision : 10 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2003-07-24 | Name: Arbitrary code can be executed on the remote host through the SQL service. File: smb_nt_ms03-031.nasl - Type: ACT_GATHER_INFO |
2003-03-06 | Name: It may be possible to get the remote SQL Server's administrator password. File: smb_nt_ms02-035.nasl - Type: ACT_GATHER_INFO |
2003-03-02 | Name: Arbitrary code can be executed on the remote host through Microsoft SQL server. File: smb_nt_ms02-030.nasl - Type: ACT_GATHER_INFO |
2003-01-25 | Name: The remote database server is affected by multiple buffer overflows. File: mssql_litchfield_overflows.nasl - Type: ACT_GATHER_INFO |
2002-08-07 | Name: The remote database server is affected by a remote command execution vulnerab... File: mssql_hello_overflow.nasl - Type: ACT_DESTRUCTIVE_ATTACK |
2002-04-23 | Name: Arbitrary code can be executed on the remote host through the web server. File: smb_nt_ms02-018.nasl - Type: ACT_GATHER_INFO |
2002-04-20 | Name: The remote service is prone to a denial of service attack. File: msdtc_dos.nasl - Type: ACT_DENIAL |
2002-02-24 | Name: Local files can be retrieved through the web client. File: smb_nt_ms02-008.nasl - Type: ACT_GATHER_INFO |
2002-02-13 | Name: Arbitrary code can be executed on the remote host through the web client. File: smb_nt_ms02-005.nasl - Type: ACT_GATHER_INFO |