Security Bulletin

Microsoft Security Bulletin MS00-014 - Critical

Patch Available for 'SQL Query Abuse' Vulnerability

Published: March 08, 2000

Version: 1.0

Originally Posted: March 08, 2000

Summary

Microsoft has released a patch that eliminates a security vulnerability in Microsoft® SQL Server 7.0 and Microsoft Data Engine (MSDE) 1.0. The vulnerability could allow the remote author of a malicious SQL query to take unauthorized actions on a SQL Server or MSDE database or on the underlying system that was hosting the SQL Server or MSDE database.

Frequently asked questions regarding this vulnerability and the patch can be found at https://www.microsoft.com/technet/security/bulletin/fq00-014.mspx

General Information

Issue

Microsoft SQL Server 7.0 and MSDE 1.0 perform incomplete argument validation on certain classes of remotely submitted SQL statements. If a user is able to submit a particular form of a SQL Select statement to SQL Server or MSDE, it is possible to take actions on the SQL data base or, if the SQL Server or MDSE is operating in an account with elevated privileges on the underlying system, on the underlying operating system itself.

In order to exploit this vulnerability, a user would have to have the right to submit queries to the SQL Server or MSDE via ODBC, OLE DB, or DB-Library and be logged on using SQL Server Security. The user would not require any special privileges beyond the right to submit SQL queries.

Affected Software Versions

  • Microsoft SQL Server Version 7.0 and Microsoft Data Engine (MSDE) 1.0.

Vulnerability Identifier: CVE-2000-0202

Patch Availability

  • https: Note: The patch provided is applicable to SQL Server Version 7 and to SQL Server Version 7 with SP1. Customers should not attempt to apply the patch to SQL Server Version 7 SP2 Beta. Instead, they should wait for the release of SQL Server Version 7 SP2 which incorporates the changes made by the patch.

    Note: Additional security patches are available at the Microsoft Download Center

More Information

Please see the following references for more information related to this issue.

Obtaining Support on this Issue

This is a fully supported patch. Information on contacting Microsoft Technical Support is available at </https:>https:.

Acknowledgments

Microsoft thanks Sven Hammesfahr https://www.itrain.de for reporting the SQL Query Abuse vulnerability to us and working with us to protect customers..

Revisions

  • March 08, 2000: Bulletin Created.

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.

Built at 2014-04-18T13:49:36Z-07:00 </https:>