Vulnerability Note VU#338195
Microsoft SQL Server installation process leaves sensitive information on system
Microsoft SQL server versions 7.0 and 2000, as well as MSDE 1.0, may leave installation and log files on the server after the installation process is complete. These files may contain senstitive information such as passwords [used during the install]. Users with authenticated access to the server may be able to view this information and gain elevated privileges.
Microsoft SQL server versions 7.0 and 2000, as well as MSDE 1.0, may leave installation and log files on the server that contain passwords, after the installation process is complete. Users that can authenticate to the server, or read files stored locally on the server may be able to view this information and gain elevated privileges.
Note that while Microsoft SQL server versions 7.0 with SP 4 installed, and 2000 with SP 1 and 2 installed, encrypt the passwords prior to storing them in the temporary files, Microsoft's security bulletin (MS02-035) states that the encryption used is "fairly weak" and could be subject to "password cracking attacks."
Local authenticated users of the server may be able to view sensitive information such as passwords and gain elevated privileges.
Use the "KillPwd" utility provided in Microsoft's security bulletin MS02-035 and apply the relevent patches.
Delete the installation log files and the "setup.iss" file after installation.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Microsoft Corporation||Affected||-||26 Jul 2002|
CVSS Metrics (Learn More)
This vulnerability was reported to Microsoft by Cesar Cerrudo.
This document was written by Jason A Rafail.
- CVE IDs: CAN-2002-0643
- Date Public: 10 Jul 2002
- Date First Published: 26 Jul 2002
- Date Last Updated: 31 Jul 2002
- Severity Metric: 6.30
- Document Revision: 14
If you have feedback, comments, or additional information about this vulnerability, please send us email.