Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

Re: iDefense Security Advisory 07.08.08: Microsoft SQL Server Restore Integer Underflow Vulnerability
From: Cesar <cesarc56 () yahoo com>
Date: Tue, 8 Jul 2008 16:26:11 -0700 (PDT)


Just to clarify, the following SQL Server vulnerabilities vulnerabilities:

SQL Server Buffer Overrun Vulnerability - CVE-2008-0106
SQL Server Memory Corruption Vulnerability - CVE-2008-0107
Convert Buffer Overrun - CVE-2008-0086

 can be exploited to take complete control of the system on Windows 2003, 
it doesn't matter the user account under SQL Server service is running.

On Windows 2008 if the service is running under Network Service or Local Service account then full system compromise is 
always possible.

*see http://www.argeniss.com/research/TokenKidnapping.pdf 

Cesar.

--- On Tue, 7/8/08, iDefense Labs <labs-no-reply () idefense com> wrote:

From: iDefense Labs <labs-no-reply () idefense com>
Subject: [Full-disclosure] iDefense Security Advisory 07.08.08: Microsoft SQL Server Restore Integer Underflow 
Vulnerability
To: vulnwatch () vulnwatch org, full-disclosure () lists grok org uk, bugtraq () securityfocus com
Date: Tuesday, July 8, 2008, 11:18 PM
iDefense Security Advisory 07.08.08
http://labs.idefense.com/intelligence/vulnerabilities/
Jul 08, 2008

I. BACKGROUND

SQL Server is Microsoft's database server product. It
supports the
restoration and inspection of backups via SQL statements.
For more
information see the vendor's website found at the
following URL.

http://www.microsoft.com/sql/default.mspx



      

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault