Executive Summary
Informations | |||
---|---|---|---|
Name | MS02-039 | First vendor Publication | N/A |
Vendor | Microsoft | Last vendor Modification | N/A |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Buffer Overruns in SQL Server 2000 Resolution Service Could Enable Code Execution (Q323875) |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:1077 | |||
Oval ID: | oval:org.mitre.oval:def:1077 | ||
Title: | MS SQL Server 2000 Resolution Service Buffer Overflow | ||
Description: | Multiple buffer overflows in the Resolution Service for Microsoft SQL Server 2000 and Microsoft Desktop Engine 2000 (MSDE) allow remote attackers to cause a denial of service or execute arbitrary code via UDP packets to port 1434 in which (1) a 0x04 byte that causes the SQL Monitor thread to generate a long registry key name, or (2) a 0x08 byte with a long string causes heap corruption, as exploited by the Slammer/Sapphire worm. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2002-0649 | Version: | 5 |
Platform(s): | Microsoft Windows NT | Product(s): | Microsoft SQL Server 2000 Microsoft SQL Server 2000 Desktop Engine (WMSDE) |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 | |
Application | 3 |
SAINT Exploits
Description | Link |
---|---|
Microsoft SQL Server 2000 resolution service buffer overflow | More info here |
ExploitDB Exploits
id | Description |
---|---|
2010-04-30 | Microsoft SQL Server Resolution Overflow |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
4578 | Microsoft SQL Resolution Service Monitor Thread Registry Key Name Overflow Microsoft SQL Server and Desktop Engine contain a flaw that may allow a remote attacker to execute arbitrary code. The issue is due to the SQL Server Resolution Service not properly sanitizing remote user input. If an attacker sends a specially crafted request (first byte set to 0x04 followed by a large string) they may be able to execute arbitrary code with the privileges of the SQL server. |
4577 | Microsoft SQL Resolution Service 0x08 Byte Long String Overflow Microsoft SQL Server and Desktop Engine contain a flaw that may allow a remote attacker to execute arbitrary code. The issue is due to the SQL Server Resolution Service not properly sanitizing remote user input. If an attacker sends a specially crafted request (byte set to 0x08 followed by long string and colon), they may be able to overflow a buffer to execute arbitrary code on the system. |
878 | Microsoft SQL Resolution Service Keep-Alive Function DoS Microsoft SQL Server and Desktop Engine contain a flaw that may allow a remote attacker to cause a denial of service. The issue is due to a flaw in the keep-alive function in the SQL Resolution Service. If a remote attacker sends a specially crafted packet with a spoofed source address, the server will fall into a recursive loop sending packets to itself. Such an attack would consume system resources as well as bandwidth resources. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | heap-based overflow attempt RuleID : 4990 - Revision : 13 - Type : SERVER-MSSQL |
2014-01-10 | heap-based overflow attempt RuleID : 4989 - Revision : 9 - Type : SERVER-MSSQL |
2014-01-10 | SQL Slammer worm propagation attempt inbound RuleID : 28555-community - Revision : 2 - Type : MALWARE-OTHER |
2014-01-10 | SQL Slammer worm propagation attempt inbound RuleID : 28555 - Revision : 2 - Type : MALWARE-OTHER |
2014-01-10 | version overflow attempt RuleID : 2050-community - Revision : 19 - Type : SERVER-MSSQL |
2014-01-10 | version overflow attempt RuleID : 2050 - Revision : 19 - Type : SERVER-MSSQL |
2014-01-10 | Worm propagation attempt OUTBOUND RuleID : 2004-community - Revision : 15 - Type : SQL |
2014-01-10 | Worm propagation attempt OUTBOUND RuleID : 2004 - Revision : 15 - Type : SQL |
2014-01-10 | Worm propagation attempt RuleID : 2003-community - Revision : 16 - Type : SQL |
2014-01-10 | Worm propagation attempt RuleID : 2003 - Revision : 16 - Type : SQL |
Metasploit Database
id | Description |
---|---|
2002-07-24 | MS02-039 Microsoft SQL Server Resolution Overflow |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2003-01-25 | Name : The remote database server is affected by multiple buffer overflows. File : mssql_litchfield_overflows.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2020-05-23 13:17:11 |
|
2014-02-17 11:44:43 |
|
2014-01-19 21:29:47 |
|