Short Name |
DB:MS-SQL:PWD-ENCRYPT |
---|---|
Severity |
Major |
Recommended |
No |
Category |
DB |
Keywords |
MS-SQL Server pwdencrypt() Buffer Overflow |
Release Date |
2003/04/22 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability against Microsoft SQL Server. Microsoft SQL Server 2000 Service Pack 2 and prior are vulnerable. Attackers can send a long string to the pwdencrypt() function in SQL Server to crash the SQL service. The service restarts automatically, but the operating system does not.
A buffer overflow vulnerability has been reported in SQL Server 2000. The vunerability is a result of an unchecked buffer when using the password encrypt procedure. This procedure is used by administrators to provides support for the storage of SQL Server Authentication credentials. The overrun condition is due to an unbounded data copy operation that occurs when processing the procedure arguments. Attackers may exploit this vulnerability by invoking the password encrypt procedure with excessive input. This issue may be related to the vulnerabilities reported in Bugtraq ID 4847.