Vulnerability Note VU#682620

Microsoft SQL Server contains buffer overflow in code used to process "BULK INSERT" queries

Original Release date: 25 Jul 2002 | Last revised: 06 Feb 2003

Overview

The Microsoft SQL Server contains a buffer overflow vulnerability that may allow remote attackers to execute arbitrary code with system privileges.

Description

The Microsoft SQL Server contains a buffer overflow vulnerability in the code used to process "Bulk Insert" queries. Bulk Insert queries allow the SQL user to supply a file containing records to be imported into the SQL database. If an attacker supplies a file with an excessively long filename, it is possible to overflow the application stack and alter the flow of execution, resulting in the execution of arbitrary code. Note that successful exploitation of this vulnerability requires Bulk Administrator or Administrator group privileges.

Impact

This vulnerability may allow remote attackers to execute arbitrary code with system privileges.

Solution

Apply a patch

Microsoft has published Security Bulletin MS02-034 to address this vulnerability. For more information, please see


This vulnerability also affects any products that include the Microsoft Desktop Engine (MSDE) 2000. For more information, please see

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Microsoft CorporationAffected11 Jul 200212 Jul 2002
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

The CERT/CC thanks NGSSoftware for their discovery and analysis of this vulnerability.

This document was written by Jeffrey P. Lanza and is based upon information provided by Microsoft and NGSSoftware.

Other Information

  • CVE IDs: CAN-2002-0641
  • Date Public: 10 Jul 2002
  • Date First Published: 25 Jul 2002
  • Date Last Updated: 06 Feb 2003
  • Severity Metric: 5.91
  • Document Revision: 25

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.