Bugtraq mailing list archives
Microsoft Security Bulletin (MS00-048)
From: secnotif () MICROSOFT COM (Microsoft Product Security)
Date: Fri, 7 Jul 2000 13:16:47 -0700
The following is a Security Bulletin from the Microsoft Product Security Notification Service. Please do not reply to this message, as it was sent from an unattended mailbox. ******************************** -----BEGIN PGP SIGNED MESSAGE----- Microsoft Security Bulletin (MS00-048) - --------------------------------------- Patch Available for "Stored Procedure Permissions" Vulnerability Originally Posted: July 7, 2000 Summary ======= Microsoft has released a patch that eliminates a security vulnerability in Microsoft(r) SQL Server 7.0. The vulnerability could allow a malicious user to run a database stored procedure without proper permissions. Frequently asked questions regarding this vulnerability and the patch can be found at: http://www.microsoft.com/technet/security/bulletin/fq00-048.asp Issue ====== Execute permission checks on stored procedures may be bypassed when a stored procedure is referenced from a temporary stored procedure. This omission would allow a malicious user to run a stored procedure that, by design, he should not be able to access. The vulnerability only occurs under a fairly restricted set of conditions: - The database and stored procedure must be owned by the system administrator (sa) login account. - The malicious user must be able to authenticate to the SQL Server, and have user access to the referenced database. Affected Software Versions ========================== Microsoft SQL Server 7.0 Patch Availability ================== - Intel: http://www.microsoft.com/Downloads/Release.asp?ReleaseID=22470 - Alpha: http://www.microsoft.com/Downloads/Release.asp?ReleaseID=22469 NOTE: Additional security patches are available at the Microsoft Download Center More Information ================ Please see the following references for more information related to this issue. - Frequently Asked Questions: Microsoft Security Bulletin MS00-048, http://www.microsoft.com/technet/security/bulletin/fq00-048.asp - Microsoft Knowledge Base (KB) article, Q266766 - Microsoft TechNet Security web site, http://www.microsoft.com/technet/security/default.asp Obtaining Support on this Issue =============================== This is a fully supported patch. Information on contacting Microsoft Product Support Services is available at http://support.microsoft.com/support/contact/default.asp Acknowledgments =============== Microsoft thanks Adina Reeve of Sequiturcorp for reporting this issue and working with us to protect customers. Revisions ========= - July 7, 2000: Bulletin Created. - ---------------------------------------------------------------------- THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY. Last Updated July 7, 2000 -----BEGIN PGP SIGNATURE----- Version: PGP Personal Privacy 6.5.3 iQEVAwUBOWY6740ZSRQxA/UrAQFNUggAizPTeRGuonj018nxCNv+zU1du7rgD+Up MaEROTyC77C+L1dH86SwM20FYXyqHmi2hdMk/IkDtC6NEomyWhYhZRLEZgb3wS3W TuiJR7ZcGplqra1j1PeFVmPkqDGkc18EG+o7JAOptkF+kwHQPSuxx7n2+8YJcmGt RCID8ScRDyasTiGvitBDfmFdCSdoXT6Fkvmqxgyn9zo3i8lhc8KfYIPlAUfm3B1S vBdfTxhwltofjJLgxYJfbU/EbMsj3lf4lRC1xyw3JpteznPvN9M7dwgooGQp/8Zf odskI85aqOGGEsc7LcoVqxIP4reWKNHWAfLZjqEbNRxeTNOK/4W7HA== =rr3B -----END PGP SIGNATURE----- ******************************************************************* You have received this e-mail bulletin as a result of your registration to the Microsoft Product Security Notification Service. You may unsubscribe from this e-mail notification service at any time by sending an e-mail to MICROSOFT_SECURITY-SIGNOFF-REQUEST () ANNOUNCE MICROSOFT COM The subject line and message body are not used in processing the request, and can be anything you like. To verify the digital signature on this bulletin, please download our PGP key at http://www.microsoft.com/technet/security/notify.asp. For more information on the Microsoft Security Notification Service please visit http://www.microsoft.com/technet/security/notify.asp. For security-related information about Microsoft products, please visit the Microsoft Security Advisor web site at http://www.microsoft.com/security.
Current thread:
- Microsoft Security Bulletin (MS00-048) Microsoft Product Security (Jul 07)
- Re: Microsoft Security Bulletin (MS00-048) Jenik (Jul 08)
- LPRng lpd should not be SETUID root Patrick Powell (Jul 09)
- NetBSD Security Advisory 2000-009 security-officer () NETBSD ORG (Jul 10)
- Re: LPRng lpd should not be SETUID root Cy Schubert - ITSD Open Systems Group (Jul 10)
- NetBSD Security Advisory 2000-010 security-officer () NETBSD ORG (Jul 10)
- <Possible follow-ups>
- Re: Microsoft Security Bulletin (MS00-048) Richard Waymire (Jul 10)
- Re: Microsoft Security Bulletin (MS00-048) Mikael Olsson (Jul 11)
- FreeBSD Ports Security Advisory: FreeBSD-SA-00:29.wu-ftpd [REVISED] FreeBSD Security Advisories (Jul 11)
- Re: Microsoft Security Bulletin (MS00-048) Richard Waymire (Jul 11)
- Remote Denial Of Service -- NetWare 5.0 with SP 5 Dimuthu Parussalla (Jul 10)
(Thread continues...)