Lucene search

K
certCERTVU:556356
HistoryJul 24, 2003 - 12:00 a.m.

Microsoft SQL Server contains flaw in checking method for the named pipe

2003-07-2400:00:00
www.kb.cert.org
22

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.012

Percentile

85.6%

Overview

A vulnerability in Microsoft SQL Server may allow an attacker to hijack a named pipe. An attacker may be able to leverage this vulnerability to gain elevated privileges.

Description

Microsoft describes a named pipe as, “a specifically named one-way or two-way channel for communication between a pipe server and one or more pipe clients.” Microsoft SQL Server does not correctly check named pipes. Quoting from MS03-031, “The vulnerability results because of a flaw in the checking method used by SQL Server when a client establishes an authenticated logon by using a named pipe.”


Impact

A local attacker may be able to hijack a named pipe, which may result in privilege elevation. Quoting from MS03-031, “This could allow an attacker to gain control of the named pipe at the same permission level as the user attempting to connect. If the user connecting remotely had higher access rights than the attacker, the attacker could assume those rights when the named pipe was compromised.”


Solution

Apply a patch.


Vendor Information

556356

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Microsoft Corporation __ Affected

Updated: July 24, 2003

Status

Affected

Vendor Statement

<http://www.microsoft.com/technet/security/bulletin/MS03-031.asp&gt;

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23556356 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was discovered by Andreas Junstream of @Stake. The CERT/CC thanks Microsoft for providing Microsoft Security Bulletin MS03-031, upon which the majority of this document is based.

This document was written by Ian A Finlay.

Other Information

CVE IDs: CVE-2003-0230
Severity Metric: 15.19 Date Public:

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.012

Percentile

85.6%

Related for VU:556356