In the case of Slammer, Microsoft built three more patches in 2002 MS02-043 in August, MS02-056 in early October and MS02-061 in mid-October for related SQL Server vulnerabilities. SQLScan is a tiny piece of software designed to help administrators find potential vulnerabilities in the SQL servers they are managing. More precisely, the tool is tailored to detect Slammer. Download Microsoft SQL Server 2000 Desktop Engine (MSDE 2000) Release A, a new release of MSDE 2000 that is now available for free.This release includes the fixes for the Slammer (W32.slammer) worm. For instance, the patch that Microsoft had made available for the hole Slammer exploited involved in some cases a 'brutally slow and manual process,' said Chip Andrews, owner of SQLSecurity.com, a. Update: 01/29 01:59 GMT by T: And if you're running systems which might be affected, take note: whitehorse writes 'The Microsoft KB article for the Slammer patch found here has an incorrect URL for 'Download the patch' referring to KB Q316333 which is only a handle leak fix. The real patch may be found later in the article.'

-->

Security Bulletin

Cumulative Patch for SQL Server (Q316333)

Published: October 02, 2002 | Updated: January 31, 2003

Version: 1.2

Originally posted: October 02, 2002

Updated: January 31, 2003

Summary

Who should read this bulletin:System administrators using Microsoft® SQL Server™ 7.0, SQL Server 2000, Microsoft Data Engine (MSDE) 1.0, and Microsoft Desktop Engine (MSDE) 2000.

Impact of vulnerability:Four vulnerabilities, the most serious of which could enable an attacker to gain control over an affected server.

Maximum Severity Rating:Critical

Recommendation:System administrators should apply the patch to affected systems.

Note: The patch released with this bulletin is effective in protecting SQL Server 2000 and MSDE 2000 against the 'SQL Slammer' worm virus. However, this patch has been superseded by the patch released with MS02-061 which contains fixes for additional security vulnerabilities in these products. Microsoft recommends that SQL 2000 and MSDE 2000 customers apply the patch from MS02-061.

Affected Software:

  • Microsoft SQL Server 7.0
  • Microsoft Data Engine (MSDE) 1.0
  • Microsoft SQL Server 2000
  • Microsoft Desktop Engine (MSDE) 2000

General Information

Technical details

Technical description:

This security patch does not contain a patch from Microsoft Knowledge Base Article 317748 that is required to ensure normal operation of SQL Server 2000 and MSDE 2000. If you have applied this security patch to a SQL Server 2000 or MSDE 2000 installation prior to applying the hotfix from Microsoft Knowledge Patch article 317748, you must answer 'no' if and when prompted to overwrite files to ensure that you do not overwrite files from the security patch.

This is a cumulative patch that includes the functionality of all previously released patches for SQL Server 7.0, SQL Server 2000, and Microsoft Data Engine (MSDE) 1.0, Microsoft Desktop Engine (MSDE) 2000. In addition, it eliminates four newly discovered vulnerabilities.

  • A buffer overrun in a section of code in SQL Server 2000 (and MSDE 2000) associated with user authentication. By sending a specially malformed login request to an affected server, an attacker could either cause the server to fail or gain the ability to overwrite memory on the server, thereby potentially running code on the server in the security context of the SQL Server service. It would not be necessary for the user to successfully authenticate to the server or to be able to issue direct commands to it in order to exploit the vulnerability.
  • A buffer overrun vulnerability that occurs in one of the Database Console Commands (DBCCs) that ship as part of SQL Server 7.0 and 2000. In the most serious case, exploiting this vulnerability would enable an attacker to run code in the context of the SQL Server service, thereby giving the attacker complete control over all databases on the server.
  • A vulnerability associated with scheduled jobs in SQL Server 7.0 and 2000. SQL Server allows unprivileged users to create scheduled jobs that will be executed by the SQL Server Agent. By design, the SQL Server Agent should only perform job steps that are appropriate for the requesting user's privileges. However, when a job step requests that an output file be created, the SQL Server Agent does so using its own privileges rather than the job owners privileges. This creates a situation in which an unprivileged user could submit a job that would create a file containing valid operating system commands in another user's Startup folder, or simply overwrite system files in order to disrupt system operation

The patch also changes the operation of SQL Server, to prevent non-administrative users from running ad hoc queries against non-SQL OLEDB data sources. Although the current operation does not represent a security vulnerability, the new operation makes it more difficult to misuse poorly coded data providers that might be installed on the server.

Mitigating factors:

Unchecked buffer in SQL Server 2000 authentication function:

  • This vulnerability on affects SQL Server 2000 and MSDE 2000. Neither SQL Server 7.0 nor MSDE 1.0 are affected.
  • If the SQL Server port (port 1433) were blocked at the firewall, the vulnerability could not be exploited from the Internet.
  • Exploiting this vulnerability would allow the attacker to escalate privileges to the level of the SQL Server service account. By default, the service runs with the privileges of a domain user, rather than with system privileges.

Unchecked buffer in Database Console Commands:

  • Exploiting this vulnerability would allow the attacker to escalate privileges to the level of the SQL Server service account. By default, the service runs with the privileges of a domain user, rather than with system privileges.
  • The vulnerability could only be exploited by an attacker who could authenticate to an affected SQL Server or has permissions to execute queries directly to the server
  • The vulnerability could only be exploited by an attacker who could authenticate to an affected SQL Server.

Flaw in output file handling for scheduled jobs:

  • The vulnerability could only be exploited by an attacker who could authenticate to an affected SQL server.

Severity Rating:

Unchecked buffer in SQL Server 2000 authentication function:

Internet ServersIntranet ServersClient Systems
SQL Server 7.0 (Including MSDE 1.0)NoneNoneNone
SQL Server 2000(Including MSDE 2000)CriticalCriticalNone

Unchecked buffer in Database Console Commands:

Internet ServersIntranet ServersClient Systems
SQL Server 7.0 (Including MSDE 1.0)CriticalCriticalNone
SQL Server 2000(Including MSDE 2000)CriticalCriticalNone

Flaw in output file handling for scheduled jobs:

Internet ServersIntranet ServersClient Systems
SQL Server 7.0 (Including MSDE 1.0)CriticalCriticalNone
SQL Server 2000(Including MSDE 2000)CriticalCriticalNone

Aggregate Severity of all issues included in this patch (including issues addressed in previously released patches):

Internet ServersIntranet ServersClient Systems
SQL Server 7.0 (Including MSDE 1.0)CriticalCriticalNone
SQL Server 2000(Including MSDE 2000)CriticalCriticalNone

The above assessment is based on the types of systems affected by the vulnerability, their typical deployment patterns, and the effect that exploiting the vulnerability would have on them.

Vulnerability identifiers:

  • Unchecked buffer in SQL Server 2000 authentication function: CAN-2002-1123
  • Unchecked buffer in Database Console Commands: CAN-2002-1137
  • Flaw in output file handling for scheduled jobs: CAN-2002-1138

Tested Versions:

Microsoft tested SQL Server 2000 and SQL Server 7.0 (and their associated versions of MSDE) to assess whether they are affected by these vulnerabilities. Previous versions are no longer supported, and may or may not be affected by these vulnerabilities.

Frequently asked questions

What is the correct order for installing this patch in conjunction with the hotfix discussed in317748?
This security patch does not contain a patch from Knowledge Base Article 317748 that is required to ensure normal operation of SQL Server 2000 and MSDE 2000. The correct order of installation is to install the 317748 patch and then this security patch. If you have applied this security patch to a SQL Server 2000 or MSDE 2000 installation prior to applying the hotfix from Knowledge Patch article 317748, you must answer 'no' if and when prompted to overwrite files to ensure that you do not overwrite files from the security patch.

How do I check I've got this security patch installed?
You should verify that the version of ssnetlib.dll in the MSSQLBINN folder for the instance you applied the patch for is: 2000.80.679.0If the version of the ssnetlib.dll in the MSSSQLBINN folder is less than 2000.80.636.0, then you will need to re-apply the security patch. However Microsoft recommends that you apply the latest security patch as described in MS02-061 since this contains fixes for additional security vulnerabilities in these products.

What vulnerabilities does this patch eliminate?
This is a cumulative patch that, when applied, address all previously addressed vulnerabilities. In addition, it eliminates three new vulnerabilities:

  • A vulnerability that could enable an attacker to gain control over a SQL Server 2000 database.
  • A new variant of a vulnerability originally discussed in Microsoft Security Bulletin MS02-038, through which an already authenticated user could gain additional privileges on a SQL Server.
  • A vulnerability through which a user could potentially cause a program to run when another user subsequently logged onto the system or overwrite files that the SQL Server Agent service would otherwise have access to.

Is this patch cumulative?
This patch does supersede all previously released security patches involving the SQL Server 7.0 and SQL Server 2000 database engines. However, applying this patch is not sufficient by itself to fully secure a SQL Server:

  • One security fix for SQL Server 2000, discussed in Microsoft Security Bulletin MS02-035, requires remediation via a tool rather than a patch. The tool only needs to be run one time, so customers who have previously run it do not need to take additional action. However, installing this patch does not cause the tool to be run.
  • The patch does not include any fixes for security vulnerabilities involving the Microsoft Data Access Components (MDAC) or Online Analytic Processing (OLAP) technologies for SQL Server. The patches for these issues (listed in the Caveats section below) must be applied separately.

The Affected Versions section says that Microsoft Desktop Engine (MSDE) is also affected by these vulnerabilities. What is MSDE?
Microsoft Desktop Engine (MSDE) is a database engine that's built and based on SQL Server technology, and which ships as part of several Microsoft products, including Microsoft Visual Studio and Microsoft Office Developer Edition. There is a direct connection between versions of MSDE and versions of SQL Server. MSDE 1.0 is based on SQL Server 7.0; MSDE 2000 is based on SQL Server 2000.

Does the patch include any other fixes?
The patch also fixes an issue that, while not a security vulnerability per se, could nevertheless aid an attacker in taking advantage of a poorly configured system. Specifically, the patch changes the operation of SQL Server to restrict unprivileged users to only performing queries against SQL Server data. In the case where a non-SQL data provider had been installed on the system, and the driver for the provider did not enforce proper security, this change would help prevent unprivileged users from abusing the situation.

Unchecked buffer in SQL Server 2000 authentication function (CAN-2002-1123):

What's the scope of this vulnerability?
This is a buffer overrun vulnerability. By sending a specially malformed login request to an affected server, an attacker could either cause the SQL Server service to fail or gain control over the database. It would not be necessary for the user to successfully authenticate to the server in order to exploit the vulnerability.This vulnerability only affects SQL Server 2000 and MSDE 2000. Although the vulnerability would provide a way to gain control over the database, it would not, under default conditions, grant the attacker significant privileges at the operating system level.

What causes the vulnerability?
The vulnerability results because a function in SQL Server 2000 (and MSDE 2.0) that handles authentication requests contains an unchecked buffer. By calling this function with specially chosen parameters, an attacker could cause a buffer overrun condition to occur.

What authentication requests are you referring to?
Depending on how the server is configured, it may use either of two methods to authenticate users - SQL Server authentication, or Windows Authentication. However, before the actual authentication process takes places, SQL Server exchanges some preliminary information. The vulnerability lies in one of the functions involved in this preliminary exchange.

What's wrong with the authentication function?
The function suffers from an unchecked buffer. Because of this, it could be possible for an attacker to initiate a preliminary exchange in a way that would overrun the buffer, thereby overwriting memory within the SQL Server service in the process.

What could this vulnerability enable an attacker to do?
An attacker who was able to successfully exploit this vulnerability could do either of two things. If he or she provided random data, the effect of overwriting the service's memory would be to cause it to fail. In the case, the administrator could restore normal operation by restarting the SQL Server.On the other hand, by providing carefully chosen data, the attacker could modify the SQL Server service to perform new functions he or she chose. The effect would be to give the attacker full control over the SQL server, and enable him or her to add, delete or modify data; reconfigure SQL Server parameters, or take any other desired action on the database.

Who could exploit the vulnerability?
Any user who could engage in an authentication attempt with an affect SQL Server - whether the attempt was successful or not - could exploit the vulnerability.

Does that mean that the attacker wouldn't need a valid SQL Server userid and password to exploit the vulnerability?
Correct. Because of where the vulnerability resides within the authentication function, the attacker would not need to be able to log onto the server - he or she would only need to be able to deliver the data packets that signify the start of an authentication attempt.

Could the vulnerability be exploited from the Internet?
It would depend on whether the attacker could engage in an authentication exchange. To do this, the SQL Server port (port 1433) would need to be open at the firewall. If the port were closed (as it should be unless absolutely necessary), an attacker could not exploit this vulnerability from the Internet.

I'm running SQL Server 7.0. Could I be affected by this vulnerability?
No. It affects only SQL Server 2000 (and MSDE 2000); it doesn't affect SQL Server 7.0 (or MSDE 1.0). However, SQL Server 7.0 administrators should still install the patch, as other vulnerabilities discussed in this bulletin do affect SQL Server 7.0.

How does the patch address this vulnerability?
The patch institutes proper buffer checking the authentication function.

Unchecked buffer in Database Console Commands (CAN-2002-1137):

What's the scope of this vulnerability?
This is a new variant of a vulnerability originally reported in Microsoft Security Bulletin MS02-038. Like the original vulnerability, this is a buffer overrun vulnerability, through which it could be possible for an attacker to either cause the SQL Server to fail or gain complete control over the database.

What causes the vulnerability?
The vulnerability results because one of the Database Console Command (DBCC) utilities provided as part of SQL Server contains unchecked buffers in the section of code that handle user inputs.

What is the Database Console Command (DBCC)?
DBCC's are utility programs provided as part of SQL Server 2000. Their purpose is to provide database administrators with an easy way to perform common housekeeping tasks. For instance, DBCCs are available to defragment databases, repair minor errors, show usage statistics, and so forth. A complete listing of the DBCCs available as part of SQL Server 2000 is included in the SQL Server 2000 online help facility.

How is this vulnerability different from the DBCC vulnerabilities discussed in Security Bulletin MS02-038?
This vulnerability is identical to the DBCC vulnerabilities discussed in Microsoft Security Bulletin MS02-038 with one exception. Unlike the DBCCs discussed in MS02-038, the one affected by this variant could be executed by any SQL user.

Download Sql Slammer Patch Microsoft Office 2010

How does the patch address the vulnerability?
The patch institutes proper buffer handling in the affected DBCC.

Flaw in output file handling for scheduled jobs(CAN-2002-1138):

What's the scope of this vulnerability?
This vulnerability could enable an attacker to do either of two things: create a program that would subsequently be executed when another user logged onto the server, or corrupt system files in an effort to disrupt system operation.The vulnerability could only be exploited by an attacker who could authenticate to the SQL server. In addition, in the first attack scenario discussed above, the effect of exploiting the vulnerability would depend on the specific privileges of the user who subsequently logged onto the system.

What causes the vulnerability?
The vulnerability results because, when the SQL Server Agent creates an output file as part of a scheduled job, it does so using its own privileges rather than those of the user who owns the job or a configured proxy account if the job owner is not a system administrator (sysadmin server role member) in SQL Server or if the job owner is a standard SQL server user.

What is the SQL Server Agent?
The SQL Server Agent is responsible for running scheduled jobs, restarting the database service and other administrative operations.

Patch

What's a scheduled job?
Scheduled jobs provide a way to cause the SQL Server to take a designated action at a particular time. Scheduled jobs are frequently used by administrators to perform regularly scheduled maintenance tasks such as backups.

Who can create scheduled jobs?
Any user can create a scheduled job, but the SQL Server Agent will only execute a particular job step if the requester has appropriate privileges.

What's wrong with the way the SQL Server Agent processes scheduled jobs?
By design, all job steps in a scheduled job should be carried out using the privileges of the person who submitted the job or, in some cases, those of a proxy account. However, when a job calls for an output file to be created, the SQL Server Agent does so using its own privileges. Because the SQL Server Agent service account is often configured with Windows administrative privileges, this allows a job to create a file anywhere on the system, regardless of the user's privileges.

What could this vulnerability enable an attacker to do?
An attacker who successfully exploited the vulnerability could create a file on the system, for either of two purposes:

  • Disrupting system operation. By overwriting system files with random data, the attacker could potentially cause the system to fail.
  • Causing other users to run program's of the attacker's choice. By creating an output file that contained valid operating system commands, and placing it in the appropriate folder (e.g., another user's Startup folder), the attacker could cause the commands to be execute the next time another user logged onto the system.

How could an attacker exploit this vulnerability?
An attacker would only need the ability to log onto an affected server to exploit the vulnerability. He or she could then create a scheduled job that creates an output file, submit it, and thereby exploit the vulnerability.

If the attacker overwrote system files, what would be needed in order to resume normal operation?
It would depend on which files were overwritten. It might only require that the administrator restart the service. However, in the worst case, the administrator might need to restore system files using an emergency repair disk.

If the attacker created a program in another user's Startup folder, what could it do?
It would depend on the privileges the user had. Anything the user could do, the program also could do.

How does the patch address the vulnerability?
The patch causes SQL Server Agent to use the job owner's credentials if the connection is a Windows Authenticated user, or the proxy account's credentials if the connection is a SQL Server authenticated user, when determining who has the right to produce an output file from a job step. As a result, users' jobs will still be able to create output files, but only in areas where the user or the proxy account's privileges permit.

Patch availability

Microsoft

Download locations for this patch

  • Microsoft SQL Server 7.0:

  • Microsoft SQL Server 2000:

Additional information about this patch

Installation platforms:

  • The SQL Server 7.0 patch can be installed on systems running SQL Server 7.0 Service Pack 4.
  • The SQL Server 2000 patch can be installed on systems running SQL Server 2000 Service Pack 2.

Inclusion in future service packs:

The fix for this issue will be included in SQL Server 2000 Service Pack 3.

Reboot needed: No. It is only necessary to restart the SQL Services

Patch can be uninstalled: The readme.txt contained in the downloadable packages contains uninstall instructions.

Download Sql Slammer Patch Microsoft Office

**Superseded patches:**This patch supersedes the one provided in Microsoft Security Bulletin MS02-043, which was itself a cumulative patch.

Verifying patch installation:

  • SQL Server 7.0:

    To ensure you have the fix installed properly, verify the individual files by consulting the date/time stamp of the files listed in the file manifest in Microsoft Knowledge Base article at http://support.microsoft.com/default.aspx?scid=kb;en-us;327068&sd=tech

  • SQL Server 2000:

    To ensure you have the fix installed properly, verify the individual files by consulting the date/time stamp of the files listed in the file manifest in Microsoft Knowledge Base article at http://support.microsoft.com/default.aspx?scid=kb;en-us;316333&sd=tech

Caveats:

  • If you are running Microsoft Windows NT Server 4.0 Service Pack 6, you must apply the hotfix that is described in Q258437 before applying this patch. Q258437 is now available for public download. See the Knowledge base article for more information.
  • This patch does not include the functionality of the Killpwd tool provided in Microsoft Security Bulletin MS02-035.
  • The patch does not supersede any previously released patches for MDAC or OLAP under SQL Server 2000. At this writing, these patches include the ones discussed in:
    • Microsoft Security BulletinMS00-092
    • Microsoft Security BulletinMS01-041
    • Microsoft Security BulletinMS02-030
  • The process for installing the patch varies somewhat depending on the specific configuration of the server. System administrators should ensure that they read the Readme.txt file in the patch package to ensure the patch is installed correctly.
Download sql slammer patch microsoft office

Localization:

Localized versions of this patch are available at the locations discussed in 'Patch Availability'.

Obtaining other security patches:

Patches for other security issues are available from the following locations:

  • Security patches are available from the Microsoft Download Center, and can be most easily found by doing a keyword search for 'security_patch'.
  • Patches for consumer platforms are available from the WindowsUpdate web site

Other information:

Acknowledgments

Microsoft thanks the following individuals:

  • Issue regarding ad hoc queries against non-SQL OLEDB data sources:

    sk@scan-associates.net and pokleyzz@scan-associates.net

  • Unchecked buffer in Database Console Commands:

    Martin Rakhmanoff (jimmers@yandex.ru)

    Support:

    • Microsoft Knowledge Base article Q316333 discusses this issue and will be available approximately 24 hours after the release of this bulletin. Knowledge Base articles can be found on the Microsoft Online Support web site.
    • Technical support is available from Microsoft Product Support Services. There is no charge for support calls associated with security patches.

    Security Resources: The Microsoft TechNet Security Web Site provides additional information about security in Microsoft products.

    Disclaimer:

    The information provided in the Microsoft Knowledge Base is provided 'as is' without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.

    Revisions:

    • V1.0 (October 02, 2002): Bulletin Created.
    • V1.1 (October 09, 2002): Caveats section updated.
    • V1.2 (January 31, 2003): Updated to advise of supercedence by MS02-061 and clarify installation order when Hotfix 317748 is applied in conjunction with this security patch.

Built at 2014-04-18T13:49:36Z-07:00

Microsoft is urgently advising Windows server customers to patch a vulnerability that allows attackers to take control of entire networks with no user interaction and, from there, rapidly spread from computer to computer.

The vulnerability, dubbed SigRed by the researchers who discovered it, resides in Windows DNS, a component that automatically responds to requests to translate a domain into the IP address computers need to locate it on the Internet. By sending maliciously formed queries, attackers can execute code that gains domain administrator rights and, from there, take control of an entire network. The vulnerability, which doesn’t apply to client versions of Windows, is present in server versions from 2003 to 2019. SigRed is formally tracked as CVE-2020-1350. Microsoft issued a fix as part of this month's Update Tuesday.

Both Microsoft and the researchers from Check Point, the security firm that discovered the vulnerability, said that it’s wormable, meaning it can spread from computer to computer in a way that’s akin to falling dominoes. With no user interaction required, computer worms have the potential to propagate rapidly just by virtue of being connected and without requiring end users to do anything at all.

When a worm’s underlying vulnerability easily allows malicious code to be executed, exploits can be especially pernicious, as was the case with both the WannaCry and NotPetya attacks from 2016 that shut down networks worldwide and caused billions of dollars in damage.

Check Point researchers said that the effort required to exploit SigRed was well within the means of skilled hackers. While there’s no evidence that the vulnerability is actively under exploit at the moment, Check Point said that’s likely to change, and if it does, the destructive effects would be high.

Advertisement

In a technical analysis, Sagi Tzadik, the company researcher who found the vulnerability in May and privately reported it to Microsoft, wrote:

We believe that the likelihood of this vulnerability being exploited is high, as we internally found all of the primitives required to exploit this bug. Due to time constraints, we did not continue to pursue the exploitation of the bug (which includes chaining together all of the exploitation primitives), but we do believe that a determined attacker will be able to exploit it. Successful exploitation of this vulnerability would have a severe impact, as you can often find unpatched Windows Domain environments, especially Domain Controllers. In addition, some Internet Service Providers (ISPs) may even have set up their public DNS servers as WinDNS.

In a brief writeup here, Microsoft analysts agreed the underlying heap-based buffer overflow was wormable. The company also rated the chances of exploitation as “more likely”. Many outside researchers concurred.

“If I’ve understood the article correctly, calling it ‘wormable’ is actually an understatement,” Vesselin Vladimirov Bontchev, a security expert who works for the National Laboratory of Computer Virology in Bulgaria, wrote on Twitter. “It’s suitable for flash worms a la Slammer, which infected the whole population of vulnerable computers on the Internet in something like 10 minutes flat.”

Download Sql Slammer Patch Microsoft

It's suitable for flash worms a la Slammer, which infected the whole population of vulnerable computers on the Internet in something like 10 minutes flat.

— Vess (@VessOnSecurity) July 14, 2020

Bontchev was disagreeing with fellow security researcher Marcus Hutchins, who said he thought it was more likely attackers would exploit SigRed in an attempt to wage crippling ransomware campaigns. In that scenario, attackers would take control of a network’s DNS server and then use it to push malware to all connected client computers. Slammer is a reference to SQL Slammer, a worm from 2003 that exploited two vulnerabilities in Microsoft’s SQL Server. Within 10 minutes of being activated, SQL Slammer infected more than 75,000 machines, some of them belonging to Microsoft.

Organizations that use Windows DNS should carefully assess the risks and install Tuesday’s patch as soon as possible. For those who can’t patch immediately, Microsoft offered stopgap measures people can take in the write up linked above.