Microsoft Security Bulletin MS02-039 Q323875
Microsoft Security Bulletin MS02-039 Q323875 Ranking & Summary
RankingClick at the star to rank
User Review: 0 (0 times)
File size: 163k
Platform: Windows 2000
Date added: 2008-10-23
Publisher: 5am Code
Microsoft Security Bulletin MS02-039 Q323875 description
SQL Server 2000 introduces the ability to host multiple instances of SQL Server on a single physical machine. Each instance operates for all intents and purposes as though it was a separate server. However, the multiple instances cannot all use the standard SQL Server session port (TCP 1433). While the default instance listens on TCP port 1433, named instances listen on any port assigned to them. The SQL Server Resolution Service, which operates on UDP port 1434, provides a way for clients to query for the appropriate network endpoints to use for a particular SQL Server instance. There are three security vulnerabilities here. The first two are buffer overruns. By sending a carefully crafted packet to the Resolution Service, an attacker could cause portions of system memory (the heap in one case, the stack in the other) to be overwritten. Overwriting it with random data would likely result in the failure of the SQL Server service; overwriting it with carefully selected data could allow the attacker to run code in the security context of the SQL Server service. The third vulnerability is a denial of service vulnerability. SQL uses a keep-alive mechanism to distinguish between active and passive instances. It is possible to create a keep-alive packet that, when sent to the Resolution Service, will cause SQL Server 2000 to respond with the same information. An attacker who created such a packet, spoofed the source address so that it appeared to come from a one SQL Server 2000 system, and sent it to a neighboring SQL Server 2000 system could cause the two systems to enter a never-ending cycle of keep-alive packet exchanges. This would consume resources on both systems, slowing performance considerably. Mitigating factors: Buffer Overruns in SQL Server Resolution Service:
- SQL Server 2000 runs in a security context chosen by the administrator at installation time. By default, it runs as a Domain User. Thus, although the attacker�s code could take any desired action on the database, it would not necessarily have significant privileges at the operating system level if best practices have been followed.
- The risk posed by the vulnerability could be mitigated by, if feasible, blocking port 1434 at the firewall.
- An attack could be broken off by restarting the SQL Server 2000 service on either of the affected systems. Normal processing on both systems would resume once the attack ceased.
- The vulnerability provides no way to gain any privileges on the system. It is a denial of service vulnerability only.
Microsoft Security Bulletin MS02-039 Q323875 Screenshot
Microsoft Security Bulletin MS02-039 Q323875 Keywords
Bookmark Microsoft Security Bulletin MS02-039 Q323875
Microsoft Security Bulletin MS02-039 Q323875 Copyright
WareSeeker.com do not provide cracks, serial numbers etc for Microsoft Security Bulletin MS02-039 Q323875. Any sharing links from rapidshare.com, yousendit.com or megaupload.com are also prohibited.
Want to place your software product here?
Please contact us for consideration.
Unchecked Buffer in Outlook Express S/MIME Parsing Free Download
Authentication Flaw in Microsoft Metadirectory Services Free Download
Unchecked Buffer in Content Management Server Free Download
Exchange 5.5 Internet Mail Connector Patch 2656.59 Free Download
On Windows 2000, the default permissions provide the Everyone group with Full access (Everyone:F) on the system root folder (typically, C:). In most cases, the system root is not in the search path Free Download
Cumulative Patch for SQL Server Free Download
Unchecked Buffer in SQL Server 2000 Free Download
Privilege elevation flaw in Network Connection Manager Free Download
- AXIGEN Mail Server Service Provider Edition 7.1.4
- A-PDF Password Security Service 1.2.0
- Domainkeys/DKIM for IIS/Exchange Server 1.1
- Microsoft Security Bulletin (MS00-082) 2.0
- Microsoft SQL Server 2000 Patch: Malformed RPC Req
- Microsoft Outlook 2000 SR-1 Update: MultiLanguage Update
- Microsoft Outlook 2000 Collaboration Data Objects
- Microsoft Outlook 2000 SR-1 Update: Java Permissio
- Security Officer 2000 Pro 2.0
- Small HTTP server 3.05.85
- Outlook 2000 Email Attachment Security Update 1
- Microsoft Outlook 98 Update: E-mail Security 6-5-2000
- Microsoft Outlook 2000 SR-1 Update: E-mail Security 6-5-2000
- Microsoft SQL Server 7.0 Service Pack Password patch 6-8-2000
- Microsoft Outlook 2000 SR-1 Email security update 6-24-2000
- AI Security Service 1.0
- JScript 5.6 Security Patch for Windows 2000 and XP MS03-008
- Microsoft SQL Server 2000 (including MS SQL Server Desktop Engine 2000) Security Patch: Extended Stored Procedure Param 12-1-00
- Internet Cyber Cafe Self Service Server 3.1
- Server Service Monitor 1.15
- DynSite x86 e1.1
- Microsoft Word 2000 Update: Mail Merge Security
- SQL Server Version Checker 1.0.5
- WinAgents TFTP Server 220.127.116.116