Microsoft SQL Server is vulnerable to a buffer overflow by calling the function OpenDataSource with long parameter data, such as the following SQL query:
exec(SELECT * FROM OpenDataSource( ''Microsoft.Jet.OLEDB.4.0'',''Data Source=\"c:\'REPLICATE('A',2000);User ID=Admin;Password=;Extended properties=Excel 5.0'')...xactions')
To exploit this vulnerability, the user must first logon to the SQL server. This requires knowledge of a valid user id and password. Once logged on, the malicious user may be able to execute arbitrary commands with the privileges of the account used by the SQL server.
With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.
– Scott Cheney, Manager of Information Security, Sierra View Medical Center