Microsoft Security Bulletin MS00-014 - Critical
Patch Available for 'SQL Query Abuse' Vulnerability
Published: March 08, 2000
Originally Posted: March 08, 2000
Microsoft has released a patch that eliminates a security vulnerability in Microsoft® SQL Server 7.0 and Microsoft Data Engine (MSDE) 1.0. The vulnerability could allow the remote author of a malicious SQL query to take unauthorized actions on a SQL Server or MSDE database or on the underlying system that was hosting the SQL Server or MSDE database.
Frequently asked questions regarding this vulnerability and the patch can be found at http://www.microsoft.com/technet/security/bulletin/fq00-014.mspx
Microsoft SQL Server 7.0 and MSDE 1.0 perform incomplete argument validation on certain classes of remotely submitted SQL statements. If a user is able to submit a particular form of a SQL Select statement to SQL Server or MSDE, it is possible to take actions on the SQL data base or, if the SQL Server or MDSE is operating in an account with elevated privileges on the underlying system, on the underlying operating system itself.
In order to exploit this vulnerability, a user would have to have the right to submit queries to the SQL Server or MSDE via ODBC, OLE DB, or DB-Library and be logged on using SQL Server Security. The user would not require any special privileges beyond the right to submit SQL queries.
Affected Software Versions
- Microsoft SQL Server Version 7.0 and Microsoft Data Engine (MSDE) 1.0.
Vulnerability Identifier: CVE-2000-0202
Note: The patch provided is applicable to SQL Server Version 7 and to SQL Server Version 7 with SP1. Customers should not attempt to apply the patch to SQL Server Version 7 SP2 Beta. Instead, they should wait for the release of SQL Server Version 7 SP2 which incorporates the changes made by the patch.
Note: Additional security patches are available at the Microsoft Download Center
Please see the following references for more information related to this issue.
- Frequently Asked Questions: Microsoft Security Bulletin MS00-014, http://www.microsoft.com/technet/security/bulletin/fq00-014.mspx.
- Microsoft Knowledge Base (KB) article 256052, http://support.microsoft.com/default.aspx?scid=kb;en-us;256052
- Microsoft TechNet Security web site, http://www.microsoft.com/technet/security/default.mspx.
Obtaining Support on this Issue
This is a fully supported patch. Information on contacting Microsoft Technical Support is available at http://support.microsoft.com/contactussupport/?ws=support.
- March 08, 2000: Bulletin Created.
THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.
Built at 2014-04-18T13:49:36Z-07:00