Vigil@nce: SQL Server, privilege elevation
July 2008 by Vigil@nce
Four vulnerabilities of SQL Server can be used by an attacker to
obtain information or to elevate his privileges.
– Gravity: 2/4
– Consequences: administrator access/rights, privileged
access/rights, data reading
– Provenance: user account
– Means of attack: no proof of concept, no attack
– Ability of attacker: expert (4/4)
– Confidence: confirmed by the editor (5/5)
– Diffusion of the vulnerable configuration: high (3/3)
– Creation date: 09/07/2008
– Identifier: VIGILANCE-VUL-7941
IMPACTED PRODUCTS
– Microsoft SQL Server [confidential versions]
– Microsoft Windows 2000 [confidential versions]
– Microsoft Windows 2003 [confidential versions]
– Microsoft Windows 2008
DESCRIPTION
Four vulnerabilities were announced in SQL Server.
An attacker with a database operator access can obtain sensitive
information, because the content of memory pages is not
reinitialized. [grav:1/4; CVE-2008-0085]
An authenticated attacker can convert the type of long data in
order to generate a buffer overflow, and thus execute code with
system privileges. [grav:2/4; CVE-2008-0086]
An authenticated attacker can force SQL Server to load a backup
file containing long data, in order to generate a buffer overrun,
then code execution. [grav:2/4; BID-30119, CVE-2008-0107,
ISVA-080709.1]
An authenticated attacker can use an INSERT query containing long
data, in order to generate a buffer overrun, then code execution.
[grav:2/4; CVE-2008-0106]
CHARACTERISTICS
– Identifiers: 941203, BID-30119, CVE-2008-0085, CVE-2008-0086,
CVE-2008-0106, CVE-2008-0107, ISVA-080709.1, MS08-040,
VIGILANCE-VUL-7941
– Url: https://vigilance.aql.fr/tree/1/7941