Summary
Detail | |||
---|---|---|---|
Vendor | Microsoft | First view | 2000-05-30 |
Product | Sql Server | Last view | 2004-12-31 |
Version | 7.0 | Type | Application |
Update | sp2 | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:microsoft:sql_server |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
5 | 2004-12-31 | CVE-2004-1560 | Microsoft SQL Server 7.0 allows remote attackers to cause a denial of service (mssqlserver service halt) via a long request to TCP port 1433, possibly triggering a buffer overflow. |
7.2 | 2003-08-27 | CVE-2003-0232 | Microsoft SQL Server 7, 2000, and MSDE allows local users to execute arbitrary code via a certain request to the Local Procedure Calls (LPC) port that leads to a buffer overflow. |
5 | 2003-08-27 | CVE-2003-0231 | Microsoft SQL Server 7, 2000, and MSDE allows local or remote authenticated users to cause a denial of service (crash or hang) via a long request to a named pipe. |
7.2 | 2003-08-27 | CVE-2003-0230 | Microsoft SQL Server 7, 2000, and MSDE allows local users to gain privileges by hijacking a named pipe during the authentication of another user, aka the "Named Pipe Hijacking" vulnerability. |
5 | 2002-12-31 | CVE-2002-1872 | Microsoft SQL Server 6.0 through 2000, with SQL Authentication enabled, uses weak password encryption (XOR), which allows remote attackers to sniff and decrypt the password. |
10 | 2002-10-28 | CVE-2002-1145 | The xp_runwebtask stored procedure in the Web Tasks component of Microsoft SQL Server 7.0 and 2000, Microsoft Data Engine (MSDE) 1.0, and Microsoft Desktop Engine (MSDE) 2000 can be executed by PUBLIC, which allows an attacker to gain privileges by updating a webtask that is owned by the database owner through the msdb.dbo.mswebtasks table, which does not have strong permissions. |
7.5 | 2002-10-11 | CVE-2002-1138 | Microsoft SQL Server 7.0 and 2000, including Microsoft Data Engine (MSDE) 1.0 and Microsoft Desktop Engine (MSDE) 2000, writes output files for scheduled jobs under its own privileges instead of the entity that launched it, which allows attackers to overwrite system files, aka "Flaw in Output File Handling for Scheduled Jobs." |
7.5 | 2002-10-11 | CVE-2002-1137 | Buffer overflow in the Database Console Command (DBCC) that handles user inputs in Microsoft SQL Server 7.0 and 2000, including Microsoft Data Engine (MSDE) 1.0 and Microsoft Desktop Engine (MSDE) 2000, allows attackers to execute arbitrary code via a long SourceDB argument in a "non-SQL OLEDB data source" such as FoxPro, a variant of CAN-2002-0644. |
10 | 2002-09-05 | CVE-2002-0721 | Microsoft SQL Server 7.0 and 2000 installs with weak permissions for extended stored procedures that are associated with helper functions, which could allow unprivileged users, and possibly remote attackers, to run stored procedures with administrator privileges via (1) xp_execresultset, (2) xp_printstatements, or (3) xp_displayparamstmt. |
4.6 | 2002-07-23 | CVE-2002-0643 | The installation of Microsoft Data Engine 1.0 (MSDE 1.0), and Microsoft SQL Server 2000 creates setup.iss files with insecure permissions and does not delete them after installation, which allows local users to obtain sensitive data, including weakly encrypted passwords, to gain privileges, aka "SQL Server Installation Process May Leave Passwords on System." |
5 | 2002-05-16 | CVE-2002-0224 | The MSDTC (Microsoft Distributed Transaction Service Coordinator) for Microsoft Windows 2000, Microsoft IIS 5.0 and SQL Server 6.5 through SQL 2000 0.0 allows remote attackers to cause a denial of service (crash or hang) via malformed (random) input. |
7.5 | 2002-05-16 | CVE-2002-0154 | Buffer overflows in extended stored procedures for Microsoft SQL Server 7.0 and 2000 allow remote attackers to cause a denial of service or execute arbitrary code via a database query with certain long arguments. |
2.1 | 2000-05-30 | CVE-2000-0402 | The Mixed Mode authentication capability in Microsoft SQL Server 7.0 stores the System Administrator (sa) account in plaintext in a log file which is readable by any user, aka the "SQL Server 7.0 Service Pack Password" vulnerability. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
100% (1) | CWE-264 | Permissions, Privileges, and Access Controls |
CAPEC : Common Attack Pattern Enumeration & Classification
id | Name |
---|---|
CAPEC-20 | Encryption Brute Forcing |
CAPEC-58 | Restful Privilege Elevation |
CAPEC-112 | Brute Force |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
59636 | Microsoft SQL Server SQL Authentication Password Encryption Weakness |
13434 | Microsoft Windows Distributed Transaction Coordinator (DTC) Malformed Input DoS |
10379 | Microsoft SQL Server Large Query DoS |
10159 | Microsoft SQL Server Multiple Extended Stored Procedure Overflows |
10141 | Microsoft SQL Server sestup.iss File Authentication Credential Disclosure |
10139 | Microsoft SQL Server Agent Arbitrary File Creation |
10138 | Microsoft SQL Server xp_displayparamstmt Procedure Privilege Escalation |
10137 | Microsoft SQL Server xp_printstatements Procedure Privilege Escalation |
10136 | Microsoft SQL Server xp_execresultset Procedure Privilege Escalation |
10131 | Microsoft SQL Server DBCC SourceDB Argument Arbitrary Command Execution |
10127 | Microsoft SQL Server xp_runwebtask Procedure Privilege Escalation |
10125 | Microsoft SQL Server Named Pipe Hijack Privilege Escalation |
10123 | Microsoft SQL Server LPC Packet Handling Local Overflow |
2299 | Microsoft SQL Server Named Pipe Handling Request Remote DoS |
557 | MS-SQL Passwordless Admin Account |
ExploitDB Exploits
id | Description |
---|---|
21693 | Microsoft SQL Server 2000 User Authentication Remote Buffer Overflow Vulnerab... |
OpenVAS Exploits
id | Description |
---|---|
2006-03-26 | Name : Microsoft's SQL Version Query File : nvt/mssql_version.nasl |
2005-11-03 | Name : MSDTC denial of service by flooding with nul bytes File : nvt/msdtc_dos.nasl |
2005-11-03 | Name : Cumulative Patch for Internet Information Services (Q327696) File : nvt/smb_nt_ms02-018.nasl |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-18 | Microsoft SQL Server TDS packet fragment handling remote denial of service at... RuleID : 29029 - Type : SERVER-MSSQL - Revision : 3 |
2014-01-18 | Microsoft SQL Server TDS packet fragment handling remote denial of service at... RuleID : 29028 - Type : SERVER-MSSQL - Revision : 3 |
2014-01-10 | MSDTC attempt RuleID : 1408-community - Type : SERVER-OTHER - Revision : 17 |
2014-01-10 | MSDTC attempt RuleID : 1408 - Type : SERVER-OTHER - Revision : 17 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2003-07-24 | Name: Arbitrary code can be executed on the remote host through the SQL service. File: smb_nt_ms03-031.nasl - Type: ACT_GATHER_INFO |
2003-03-09 | Name: The remote SQL server is vulnerable to an information disclosure attack. File: smb_nt_ms00-035.nasl - Type: ACT_GATHER_INFO |
2003-03-06 | Name: It may be possible to get the remote SQL Server's administrator password. File: smb_nt_ms02-035.nasl - Type: ACT_GATHER_INFO |
2003-01-25 | Name: The remote database server is affected by multiple buffer overflows. File: mssql_litchfield_overflows.nasl - Type: ACT_GATHER_INFO |
2002-04-23 | Name: Arbitrary code can be executed on the remote host through the web server. File: smb_nt_ms02-018.nasl - Type: ACT_GATHER_INFO |
2002-04-20 | Name: The remote service is prone to a denial of service attack. File: msdtc_dos.nasl - Type: ACT_DENIAL |