Rapid7 Vulnerability & Exploit Database

Microsoft SQL Server 2000 pwdencrypt Buffer Overflow

Free InsightVM Trial No credit card necessary
Watch Demo See how it all works
Back to Search

Microsoft SQL Server 2000 pwdencrypt Buffer Overflow

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
07/23/2002
Created
07/25/2018
Added
11/01/2004
Modified
12/04/2013

Description

Microsoft SQL Server is vulnerable to a buffer overflow by calling the function pwdencrypt with long parameter data, such as the following SQL query:

SELECT pwdencrypt(REPLICATE('A',1000))

To exploit this vulnerability, the user must first logon to the SQL server. This requires knowledge of a valid user id and password. Once logged on, the malicious user may be able to execute arbitrary commands with the privileges of the account used by the SQL server.

Solution(s)

  • install-microsoft-patch-a004644f0c4e110b43a2d28aee71bc3c

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;