Check Point Reference: | CPAI-2008-311 |
Date Published: | 4 Nov 2009 |
Severity: | High |
Last Updated: | Wednesday 04 November, 2009 |
Source: | |
Industry Reference: | CVE-2008-0106 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | Microsoft SQL Server is a popular relational database management system (RDBMS). Microsoft SQL Server can be administered programmatically using system stored procedures, or through Distributed Management Objects (DMO). Its primary query language is Transact-SQL, an implementation of the ANSI/ISO standard Structured Query Language (SQL). There exists a buffer overflow in Microsoft SQL Server. The vulnerability is due improper input validation when processing INSERT statements. A remote authenticated attacker can exploit this vulnerability by sending a specially crafted SQL statement to the target server, potentially causing arbitrary code injection and execution with the privileges of the affected process. In an attack case where code injection is not successful, the SQL server process will terminate. In a more sophisticated attack scenario where code injection is successful, the behaviour of the target host is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the SQL server process, which could have privileges as the System account. |
This protection will detect and block attempts to exploit this vulnerability
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Microsoft SQL Server Protection Violation.
Attack Information: Microsoft SQL Server INSERT statement buffer overflow (MS08-040)