Vulnerability Note VU#338195

Microsoft SQL Server installation process leaves sensitive information on system

Original Release date: 26 Jul 2002 | Last revised: 31 Jul 2002

Overview

Microsoft SQL server versions 7.0 and 2000, as well as MSDE 1.0, may leave installation and log files on the server after the installation process is complete. These files may contain senstitive information such as passwords [used during the install]. Users with authenticated access to the server may be able to view this information and gain elevated privileges.

Description

Microsoft SQL server versions 7.0 and 2000, as well as MSDE 1.0, may leave installation and log files on the server that contain passwords, after the installation process is complete. Users that can authenticate to the server, or read files stored locally on the server may be able to view this information and gain elevated privileges.

Note that while Microsoft SQL server versions 7.0 with SP 4 installed, and 2000 with SP 1 and 2 installed, encrypt the passwords prior to storing them in the temporary files, Microsoft's security bulletin (MS02-035) states that the encryption used is "fairly weak" and could be subject to "password cracking attacks."

Impact

Local authenticated users of the server may be able to view sensitive information such as passwords and gain elevated privileges.

Solution

Use the "KillPwd" utility provided in Microsoft's security bulletin MS02-035 and apply the relevent patches.

Delete the installation log files and the "setup.iss" file after installation.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Microsoft CorporationAffected-26 Jul 2002
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

This vulnerability was reported to Microsoft by Cesar Cerrudo.

This document was written by Jason A Rafail.

Other Information

  • CVE IDs: CAN-2002-0643
  • Date Public: 10 Jul 2002
  • Date First Published: 26 Jul 2002
  • Date Last Updated: 31 Jul 2002
  • Severity Metric: 6.30
  • Document Revision: 14

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.