[SECURITY-L] CAIS-Alerta: Patch Acumulativo para Microsoft SQL Server (815495)

Daniela Regina Barbetti Silva daniela em ccuec.unicamp.br
Qui Jul 24 13:06:39 -03 2003


----- Forwarded message from Centro de Atendimento a Incidentes de Seguranca <cais em cais.rnp.br> -----

From: Centro de Atendimento a Incidentes de Seguranca <cais em cais.rnp.br>
Subject: CAIS-Alerta: Patch Acumulativo para Microsoft SQL Server (815495)
To: rnp-alerta em cais.rnp.br, rnp-seg em cais.rnp.br
Cc: Centro de Atendimento a Incidentes de Seguranca <cais em cais.rnp.br>
Date: Thu, 24 Jul 2003 12:22:53 -0300 (BRT)

-----BEGIN PGP SIGNED MESSAGE-----


Prezados,

O CAIS está repassando o alerta divulgado pela Microsoft, Microsoft
Security Bulletin MS03-031: Cumulative Patch for Microsoft SQL Server
(815495), que trata da disponibilização de patch acumulativo para o
Microsoft SQL Server que elimina três vulnerabilidades recentemente
identificadas.


Sistemas Afetados:

	. Microsoft SQL Server 7.0
	. Microsoft Data Engine (MSDE) 1.0
	. Microsoft SQL Server 2000
	. Microsoft SQL Server 2000 Desktop Engine (MSDE 2000)
	. Microsoft SQL Server 2000 Desktop Engine (Windows)

Correções disponíveis:

A correção consiste na aplicação do patch recomendado pela Microsoft e
disponível em:

* Microsoft SQL Server 7.0
http://microsoft.com/downloads/details.aspx?FamilyId=FE5B0892-A5C9-44C2-9B42-0D291E9C1636&displaylang=en


* Microsoft SQL 2000 32-bit Edition
http://microsoft.com/downloads/details.aspx?FamilyId=9814AE9D-BD44-40C5-ADD3-B8C99618E68D&displaylang=en


* Microsoft SQL 2000 64-bit Edition
http://microsoft.com/downloads/details.aspx?FamilyId=72336508-057A-4E86-8F2E-CB1BD3A6A44B&displaylang=en


Maiores informações:

http://www.microsoft.com/technet/security/bulletin/ms03-031.asp

Identificadores do CVE: CAN-2003-0230, CAN-2003-0231, CAN-2003-0232
                        (http://cve.mitre.org)


O CAIS recomenda aos administradores de plataformas Microsoft que
mantenham seus sistemas e aplicativos sempre atualizados.


Atenciosamente,


################################################################
#   CENTRO DE ATENDIMENTO A INCIDENTES DE SEGURANCA / RNP      #
#                                                              #
# cais em cais.rnp.br     http://www.cais.rnp.br                  #
# Tel. 019-37873300    Fax. 019-37873301                       #
# Chave PGP disponivel em: http://www.cais.rnp.br/cais-pgp.key #
################################################################

- -----------------------------------------------------------------
Title:      Cumulative Patch for Microsoft SQL Server (815495)

Date:       23 July 2003
Software:
 - Microsoft SQL Server 7.0
 - Microsoft Data Engine (MSDE) 1.0
 - Microsoft SQL Server 2000
 - Microsoft SQL Server 2000 Desktop Engine (MSDE 2000)
 - Microsoft SQL Server 2000 Desktop Engine (Windows)

Impact:     Run code of attacker's choice
Max Risk:   Important
Bulletin:   MS03-031

Microsoft encourages customers to review the Security Bulletins at:
http://www.microsoft.com/technet/security/bulletin/MS03-031.asp
http://www.microsoft.com/security/security_bulletins/ms03-031.asp
- -----------------------------------------------------------------

Issue:
======
This is a cumulative patch that includes the functionality of all
previously released patches for SQL Server 7.0, SQL Server 2000, MSDE
1.0, and MSDE 2000. In addition, it eliminates three newly discovered
vulnerabilities.

 - Named Pipe Hijacking -
Upon system startup, SQL Server creates and listens on a specific
named pipe for incoming connections to the server. A named pipe is a
specifically named one-way or two-way channel for communication
between a pipe server and one or more pipe clients. The named pipe is
checked for verification of which connection attempts can log on to
the system running SQL Server to execute queries against data that is
stored on the server.

A flaw exists in the checking method for the named pipe that could
allow an attacker local to the system running SQL Server to hijack
(gain control of) the named pipe during another client's
authenticated logon password. This would allow the attacker to gain
control of the named pipe at the same permission level as the user
who is attempting to connect. If the user who is attempting to
connect remotely has a higher level of permissions than the attacker,
the attacker will assume those rights when the named pipe is
compromised.

 - Named Pipe Denial of Service -
In the same named pipes scenario that is mentioned in the "Named Pipe
Hijacking" section of this bulletin, it is possible for an
unauthenticated user who is local to the intranet to send a very
large packet to a specific named pipe on which the system running SQL
Server is listening and cause it to become unresponsive.

This vulnerability would not allow an attacker to run arbitrary code
or elevate their permissions, but it may still be possible for a
denial of service condition to exist that would require that the
server be restarted to restore functionality.

 - SQL Server Buffer Overrun -
A flaw exists in a specific Windows function that may allow an
authenticated user-with direct access to log on to the system running
SQL Server-the ability create a specially crafted packet that, when
sent to the listening local procedure call (LPC) port of the system,
could cause a buffer overrun.
If successfully exploited, this could allow a user with limited
permissions on the system to elevate their permissions to the level
of the SQL Server service account, or cause arbitrary code to run.

Mitigating Factors:
====================
Named Pipe Hijacking:
 - To exploit this flaw, the attacker would need to be an
   authenticated user local to the system.
 - This vulnerability provides no way for an attacker to remotely
   usurp control over the named pipe.

Named Pipe Denial of Service:
 - Although it is unnecessary that the attacker be authenticated,
   to exploit this flaw the attacker would require access to the
   local intranet.
 - Restarting the SQL Server Service will reinstate normal
   operations
 - This flaw provides no method by which an attacker can gain
   access to the system or information contained in the database.

SQL Server Buffer Overrun:
 - To exploit this flaw, the attacker would need to be an
   authenticated user local to the system.
 - This vulnerability cannot be remotely exploited.

Risk Rating:
============
 - Important

Patch Availability:
===================
 - A patch is available to fix this vulnerability. Please read the
Security Bulletins at
   http://www.microsoft.com/technet/security/bulletin/ms03-031.asp
   http://www.microsoft.com/security/security_bulletins/ms03-031.asp

   for information on obtaining this patch.

Acknowledgment:
===============
 - Andreas Junestam www. em stake.com

- -----------------------------------------------------------------

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS
ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE
FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL,
CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF
MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION
OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO
THE FOREGOING LIMITATION MAY NOT APPLY.


*******************************************************************


-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.8

iQCVAwUBPx/51+kli63F4U8VAQHKuAP5AXcFu676E5RqR6jO9A1mu68zcuMPmQv4
chsryYK87DWn/aptSyglxY7hNP5SjE+vKmfdRQ6ct4DWQQnn8pubMLp+EwO/Mu6N
YKJLT9j5ZyYQ894ftcio1OyCzLKC5uNWhBBukuHTNsMpy7grA7nMmp0dTGP+JTBp
MVdMsGyvXBE=
=G+Ce
-----END PGP SIGNATURE-----


----- End forwarded message -----



Mais detalhes sobre a lista de discussão SECURITY-L