Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!

TUCoPS :: Windows :: mssql9~1.txt

MS SQL Server 7.0 - Execute permission checks bypassed


    MS SQL


    Microsoft SQL Server 7.0


    Following is based on a Security Bulletin (MS00-048) from the  MS.
    Execute permission  checks on  stored procedures  may be  bypassed
    when  a  stored  procedure  is  referenced from a temporary stored
    procedure.  This  omission would allow  a malicious user  to run a
    stored procedure that, by design, he should not be able to access.
    The vulnerability  only occurs  under a  fairly restricted  set of

      - The database and stored procedure must be owned by the  system
        administrator (sa) login account.
      - The  malicious user  must be  able to  authenticate to the SQL
        Server, and have user access to the referenced database.

    Microsoft thanks  Adina Reeve  of Sequiturcorp  for reporting this
    issue and working with them to protect customers.

    The problem is very big.   Most sites that running MS SQL  server,
    web server  and server  side scripts  will allow  users to  insert
    data into SQL  query strings. (any  kind of search  engines, etc).
    This bug will allow not only  gain access to DB data, but  also to
    execute anything locally on server.


    Patch availability:

      - Intel:
      - Alpha:

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2015 AOH