[15708] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Microsoft Security Bulletin (MS00-048)

daemon@ATHENA.MIT.EDU (Jenik)
Mon Jul 10 04:47:10 2000

Mime-Version: 1.0
Content-Type: multipart/alternative;
              boundary="----=_NextPart_000_002A_01BFE91F.1B8FCC50"
Message-Id:  <002d01bfe90e$58ca9a70$0100a8c0@pcjenik>
Date:         Sat, 8 Jul 2000 20:57:20 +0200
Reply-To: Jenik <jenik@iiclub.co.il>
From: Jenik <jenik@CPOL.COM>
To: BUGTRAQ@SECURITYFOCUS.COM

This is a multi-part message in MIME format.

------=_NextPart_000_002A_01BFE91F.1B8FCC50
Content-Type: text/plain;
	charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

Microsoft had better mention "xp_cmdshell" function in their faq! :)=20

The problem is very big. Most sites that running MS SQL server, web =
server and server side scripts will allow users to insert data into SQL =
query strings. (any kind of search engines, etc). This bug will allow =
not only gain access to DB data, but also to execute anything locally on =
server.=20

    Jenik.

----- Original Message -----=20
From: "Microsoft Product Security" <secnotif@MICROSOFT.COM>
To: <BUGTRAQ@SECURITYFOCUS.COM>
Sent: Friday, July 07, 2000 10:16 PM
Subject: Microsoft Security Bulletin (MS00-048)


> The following is a Security  Bulletin from the Microsoft Product =
Security
> Notification Service.
>=20
> Please do not  reply to this message,  as it was sent  from an =
unattended
> mailbox.
>                     ********************************
>=20
> -----BEGIN PGP SIGNED MESSAGE-----
>=20
> Microsoft Security Bulletin (MS00-048)
> - ---------------------------------------
>=20
> Patch Available for "Stored Procedure Permissions" Vulnerability
> Originally Posted:  July 7, 2000
>=20
> Summary
> =3D=3D=3D=3D=3D=3D=3D
> Microsoft has released a patch that eliminates a security
> vulnerability in Microsoft(r) SQL Server 7.0. The vulnerability could
> allow a malicious user to run a database stored procedure without
> proper permissions.
>=20
> Frequently asked questions regarding this vulnerability and the patch
> can be found at:
> http://www.microsoft.com/technet/security/bulletin/fq00-048.asp
>=20
> Issue
> =3D=3D=3D=3D=3D=3D
> Execute permission checks on stored procedures may be bypassed when a
> stored procedure is referenced from a temporary stored procedure.
> This omission would allow a malicious user to run a stored procedure
> that, by design, he should not be able to access.
>=20
> The vulnerability only occurs under a fairly restricted set of
> conditions:
>=20
>  - The database and stored procedure must be owned by the system
>    administrator (sa) login account.
>=20
>  - The malicious user must be able to authenticate to the SQL Server,
>    and have user access to the referenced database.
>=20
> Affected Software Versions
> =
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D
> Microsoft SQL Server 7.0
>=20
> Patch Availability
> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
>  - Intel:
>    http://www.microsoft.com/Downloads/Release.asp?ReleaseID=3D22470
>  - Alpha:
>    http://www.microsoft.com/Downloads/Release.asp?ReleaseID=3D22469
>=20
> NOTE:  Additional security patches are available at the Microsoft
> Download Center
>=20
> More Information
> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
> Please see the following references for more information related to
> this issue.
>  - Frequently Asked Questions: Microsoft Security Bulletin MS00-048,
>    http://www.microsoft.com/technet/security/bulletin/fq00-048.asp
>  - Microsoft Knowledge Base (KB) article, Q266766
>  - Microsoft TechNet Security web site,
>    http://www.microsoft.com/technet/security/default.asp
>=20
> Obtaining Support on this Issue
> =
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D
> This is a fully supported patch. Information on contacting Microsoft
> Product Support Services is available at
> http://support.microsoft.com/support/contact/default.asp
>=20
>=20
> Acknowledgments
> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
> Microsoft thanks Adina Reeve of Sequiturcorp for reporting this issue
> and working with us to protect customers.
>=20
> Revisions
> =3D=3D=3D=3D=3D=3D=3D=3D=3D
>  - July 7, 2000: Bulletin Created.
>=20
> - =
----------------------------------------------------------------------
>=20
> THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED
> "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL
> WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF
> MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT
> SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY
> DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL,
> CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF
> MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE
> POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION
> OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO
> THE FOREGOING LIMITATION MAY NOT APPLY.
>=20
> Last Updated July 7, 2000
>=20
> -----BEGIN PGP SIGNATURE-----
> Version: PGP Personal Privacy 6.5.3
>=20
> iQEVAwUBOWY6740ZSRQxA/UrAQFNUggAizPTeRGuonj018nxCNv+zU1du7rgD+Up
> MaEROTyC77C+L1dH86SwM20FYXyqHmi2hdMk/IkDtC6NEomyWhYhZRLEZgb3wS3W
> TuiJR7ZcGplqra1j1PeFVmPkqDGkc18EG+o7JAOptkF+kwHQPSuxx7n2+8YJcmGt
> RCID8ScRDyasTiGvitBDfmFdCSdoXT6Fkvmqxgyn9zo3i8lhc8KfYIPlAUfm3B1S
> vBdfTxhwltofjJLgxYJfbU/EbMsj3lf4lRC1xyw3JpteznPvN9M7dwgooGQp/8Zf
> odskI85aqOGGEsc7LcoVqxIP4reWKNHWAfLZjqEbNRxeTNOK/4W7HA=3D=3D
> =3Drr3B
> -----END PGP SIGNATURE-----
>=20
>    *******************************************************************
> You have received  this e-mail bulletin as a result  of your =
registration
> to  the   Microsoft  Product  Security  Notification   Service.  You  =
may
> unsubscribe from this e-mail notification  service at any time by =
sending
> an  e-mail  to  =
MICROSOFT_SECURITY-SIGNOFF-REQUEST@ANNOUNCE.MICROSOFT.COM
> The subject line and message body are not used in processing the =
request,
> and can be anything you like.
>=20
> To verify the digital signature on this bulletin, please download our =
PGP
> key at http://www.microsoft.com/technet/security/notify.asp.
>=20
> For  more  information on  the  Microsoft  Security Notification  =
Service
> please  visit  http://www.microsoft.com/technet/security/notify.asp.  =
For
> security-related information  about Microsoft products, please  visit =
the
> Microsoft Security Advisor web site at =
http://www.microsoft.com/security.
>=20

------=_NextPart_000_002A_01BFE91F.1B8FCC50
Content-Type: text/html;
	charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META content=3D"text/html; charset=3Dwindows-1252" =
http-equiv=3DContent-Type>
<META content=3D"MSHTML 5.00.2920.0" name=3DGENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY background=3D"" bgColor=3D#ffffff>
<DIV><FONT size=3D2>Microsoft had better mention "<A=20
href=3D"http://msdn.microsoft.com/library/default.asp?URL=3D/library/psdk=
/sql/sp_wa-wz.htm">xp_cmdshell</A>"=20
function in their faq! :) <BR><BR>The problem is very big. Most sites=20
that&nbsp;running MS SQL server,&nbsp;web server and&nbsp;server side =
scripts=20
will allow users to insert data into SQL query strings. (any kind of =
search=20
engines, etc). This bug will allow not only gain access to DB data, but =
also to=20
execute anything locally on server.&nbsp;</FONT></DIV>
<DIV><FONT size=3D2><BR>&nbsp;&nbsp;&nbsp; Jenik.</FONT></DIV>
<DIV><FONT size=3D2><BR>----- Original Message ----- <BR>From: =
"Microsoft Product=20
Security" &lt;secnotif@MICROSOFT.COM&gt;<BR>To:=20
&lt;BUGTRAQ@SECURITYFOCUS.COM&gt;<BR>Sent: Friday, July 07, 2000 10:16=20
PM<BR>Subject: Microsoft Security Bulletin (MS00-048)<BR><BR><BR>&gt; =
The=20
following is a Security&nbsp; Bulletin from the Microsoft Product=20
Security<BR>&gt; Notification Service.<BR>&gt; <BR>&gt; Please do =
not&nbsp;=20
reply to this message,&nbsp; as it was sent&nbsp; from an =
unattended<BR>&gt;=20
mailbox.<BR>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=20
********************************<BR>&gt; <BR>&gt; -----BEGIN PGP SIGNED=20
MESSAGE-----<BR>&gt; <BR>&gt; Microsoft Security Bulletin =
(MS00-048)<BR>&gt; -=20
---------------------------------------<BR>&gt; <BR>&gt; Patch Available =
for=20
"Stored Procedure Permissions" Vulnerability<BR>&gt; Originally =
Posted:&nbsp;=20
July 7, 2000<BR>&gt; <BR>&gt; Summary<BR>&gt; =
=3D=3D=3D=3D=3D=3D=3D<BR>&gt; Microsoft has=20
released a patch that eliminates a security<BR>&gt; vulnerability in=20
Microsoft(r) SQL Server 7.0. The vulnerability could<BR>&gt; allow a =
malicious=20
user to run a database stored procedure without<BR>&gt; proper=20
permissions.<BR>&gt; <BR>&gt; Frequently asked questions regarding this=20
vulnerability and the patch<BR>&gt; can be found at:<BR>&gt;=20
http://www.microsoft.com/technet/security/bulletin/fq00-048.asp<BR>&gt; =
<BR>&gt;=20
Issue<BR>&gt; =3D=3D=3D=3D=3D=3D<BR>&gt; Execute permission checks on =
stored procedures may=20
be bypassed when a<BR>&gt; stored procedure is referenced from a =
temporary=20
stored procedure.<BR>&gt; This omission would allow a malicious user to =
run a=20
stored procedure<BR>&gt; that, by design, he should not be able to=20
access.<BR>&gt; <BR>&gt; The vulnerability only occurs under a fairly =
restricted=20
set of<BR>&gt; conditions:<BR>&gt; <BR>&gt;&nbsp; - The database and =
stored=20
procedure must be owned by the system<BR>&gt;&nbsp;&nbsp;&nbsp; =
administrator=20
(sa) login account.<BR>&gt; <BR>&gt;&nbsp; - The malicious user must be =
able to=20
authenticate to the SQL Server,<BR>&gt;&nbsp;&nbsp;&nbsp; and have user =
access=20
to the referenced database.<BR>&gt; <BR>&gt; Affected Software =
Versions<BR>&gt;=20
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D<BR>&gt; Microsoft SQL Server 7.0<BR>&gt; <BR>&gt;=20
Patch Availability<BR>&gt; =
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<BR>&gt;&nbsp; -=20
Intel:<BR>&gt;&nbsp;&nbsp;&nbsp;=20
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=3D22470<BR>&gt;&=
nbsp; -=20
Alpha:<BR>&gt;&nbsp;&nbsp;&nbsp;=20
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=3D22469<BR>&gt; =
<BR>&gt;=20
NOTE:&nbsp; Additional security patches are available at the =
Microsoft<BR>&gt;=20
Download Center<BR>&gt; <BR>&gt; More Information<BR>&gt;=20
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<BR>&gt; Please see the =
following references for more=20
information related to<BR>&gt; this issue.<BR>&gt;&nbsp; - Frequently =
Asked=20
Questions: Microsoft Security Bulletin =
MS00-048,<BR>&gt;&nbsp;&nbsp;&nbsp;=20
http://www.microsoft.com/technet/security/bulletin/fq00-048.asp<BR>&gt;&n=
bsp; -=20
Microsoft Knowledge Base (KB) article, Q266766<BR>&gt;&nbsp; - Microsoft =
TechNet=20
Security web site,<BR>&gt;&nbsp;&nbsp;&nbsp;=20
http://www.microsoft.com/technet/security/default.asp<BR>&gt; <BR>&gt; =
Obtaining=20
Support on this Issue<BR>&gt; =
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D<BR>&gt; This is a=20
fully supported patch. Information on contacting Microsoft<BR>&gt; =
Product=20
Support Services is available at<BR>&gt;=20
http://support.microsoft.com/support/contact/default.asp<BR>&gt; =
<BR>&gt;=20
<BR>&gt; Acknowledgments<BR>&gt; =
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<BR>&gt; Microsoft thanks =
Adina=20
Reeve of Sequiturcorp for reporting this issue<BR>&gt; and working with =
us to=20
protect customers.<BR>&gt; <BR>&gt; Revisions<BR>&gt; =
=3D=3D=3D=3D=3D=3D=3D=3D=3D<BR>&gt;&nbsp; -=20
July 7, 2000: Bulletin Created.<BR>&gt; <BR>&gt; -=20
----------------------------------------------------------------------<BR=
>&gt;=20
<BR>&gt; THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS=20
PROVIDED<BR>&gt; "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT =
DISCLAIMS=20
ALL<BR>&gt; WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE =
WARRANTIES=20
OF<BR>&gt; MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO=20
EVENT<BR>&gt; SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR =

ANY<BR>&gt; DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, =
INCIDENTAL,<BR>&gt;=20
CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN =
IF<BR>&gt;=20
MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE<BR>&gt;=20
POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE =
EXCLUSION<BR>&gt; OR=20
LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES =
SO<BR>&gt; THE=20
FOREGOING LIMITATION MAY NOT APPLY.<BR>&gt; <BR>&gt; Last Updated July =
7,=20
2000<BR>&gt; <BR>&gt; -----BEGIN PGP SIGNATURE-----<BR>&gt; Version: PGP =

Personal Privacy 6.5.3<BR>&gt; <BR>&gt;=20
iQEVAwUBOWY6740ZSRQxA/UrAQFNUggAizPTeRGuonj018nxCNv+zU1du7rgD+Up<BR>&gt; =

MaEROTyC77C+L1dH86SwM20FYXyqHmi2hdMk/IkDtC6NEomyWhYhZRLEZgb3wS3W<BR>&gt; =

TuiJR7ZcGplqra1j1PeFVmPkqDGkc18EG+o7JAOptkF+kwHQPSuxx7n2+8YJcmGt<BR>&gt; =

RCID8ScRDyasTiGvitBDfmFdCSdoXT6Fkvmqxgyn9zo3i8lhc8KfYIPlAUfm3B1S<BR>&gt; =

vBdfTxhwltofjJLgxYJfbU/EbMsj3lf4lRC1xyw3JpteznPvN9M7dwgooGQp/8Zf<BR>&gt; =

odskI85aqOGGEsc7LcoVqxIP4reWKNHWAfLZjqEbNRxeTNOK/4W7HA=3D=3D<BR>&gt; =
=3Drr3B<BR>&gt;=20
-----END PGP SIGNATURE-----<BR>&gt; <BR>&gt;&nbsp;&nbsp;&nbsp;=20
*******************************************************************<BR>&g=
t; You=20
have received&nbsp; this e-mail bulletin as a result&nbsp; of your=20
registration<BR>&gt; to&nbsp; the&nbsp;&nbsp; Microsoft&nbsp; =
Product&nbsp;=20
Security&nbsp; Notification&nbsp;&nbsp; Service.&nbsp; You&nbsp; =
may<BR>&gt;=20
unsubscribe from this e-mail notification&nbsp; service at any time by=20
sending<BR>&gt; an&nbsp; e-mail&nbsp; to&nbsp;=20
MICROSOFT_SECURITY-SIGNOFF-REQUEST@ANNOUNCE.MICROSOFT.COM<BR>&gt; The =
subject=20
line and message body are not used in processing the request,<BR>&gt; =
and can be=20
anything you like.<BR>&gt; <BR>&gt; To verify the digital signature on =
this=20
bulletin, please download our PGP<BR>&gt; key at=20
http://www.microsoft.com/technet/security/notify.asp.<BR>&gt; <BR>&gt; =
For&nbsp;=20
more&nbsp; information on&nbsp; the&nbsp; Microsoft&nbsp; Security=20
Notification&nbsp; Service<BR>&gt; please&nbsp; visit&nbsp;=20
http://www.microsoft.com/technet/security/notify.asp.&nbsp; For<BR>&gt;=20
security-related information&nbsp; about Microsoft products, =
please&nbsp; visit=20
the<BR>&gt; Microsoft Security Advisor web site at=20
http://www.microsoft.com/security.<BR>&gt; </FONT></DIV></BODY></HTML>

------=_NextPart_000_002A_01BFE91F.1B8FCC50--

home help back first fref pref prev next nref lref last post