File: 1387.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (72 lines) | stat: -rw-r--r-- 1,415 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
Rule:

--
Sid:

1387

--
Summary:

This event is generated when an attempt is made to overflow a buffer in Microsoft SQL server.

--
Impact:

A successful attack will allow an attacker to run arbitrary code on the SQL Server using the privileges of the account that SQL Server is running under typically, administrator.


--
Detailed Information:

Microsoft SQL Server has a exploitable overflow in raiserror() function. An attack can inject the malicious SQL commands containing an overly long input in attempt to overflow the buffer.

Moreover, the specifier will enable an attack to execute an arbitrary command in a memory space, leading to a total system compromise.
 

--
Affected Systems:

	Microsoft SQL Server 7.0 
 	Microsoft SQL Server 2000
	

--
Attack Scenarios:

An attacker could send arbitrary queries to a SQL server through web applications.

--
Ease of Attack:

Moderately difficult, since the exploit depends on an ability to inject SQL commands to the SQL server.

--
False Positives:

None known.

--
False Negatives:

None known.

--
Corrective Action:

Apply the appropriate vendor supplied patch.

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>
Snort documentation contributed by Nawapong Nakjang (tony@ksc.net, tonie@thai.com)

--
Additional References:

CERT:
http://www.cert.org/advisories/CA-2002-22.html

--