Microsoft SQL Server 2000 contains a remotely exploitable stack buffer overflow that allows attackers to execute arbitrary code with the same privileges as the SQL server.
The SQL Server Resolution Service (SSRS) was introduced in Microsoft SQL Server 2000 to provide referral services for multiple server instances running on the same machine. The service listens for requests on UDP port 1434 and returns the IP address and port number of the SQL server instance that provides access to the requested database.
The SSRS contains a stack buffer overflow that allows an attacker to execute arbitrary code by sending a crafted request to port 1434/udp. The code within such a request will be executed by the server host with the privileges of the SQL Server service account.
This vulnerability allows unauthenticated remote attackers to execute arbitrary code with the privileges of the SQL service account. If the privileges of the service account are elevated via VU#796313, this vulnerability may result in compromise of the server host.
Apply a patch
Block port 1434/udp
BindView Corporation Affected
Cisco Systems, Inc. Affected
Express Metrix LLC Affected
Hewlett-Packard Company Affected
Lightspeed Systems Affected
Microsoft Corporation Affected
Small Wonders Software Affected
Veritas SOFTWARE Affected
Xerox Corporation Affected
Netwiz Pty Ltd Not Affected
Nortel Networks, Inc. Not Affected
Baltimore Technologies plc Unknown
Blackboard Inc. Unknown
Computer Associates Unknown
Dell Computer Corporation Unknown
Elron Software Unknown
Fluke Corporation Unknown
GFI Software Unknown
Internet Security Systems Inc. Unknown
Komercni Banka Unknown
Meridian Project Systems Unknown
Pharos Systems Unknown
Power Measurement Unknown
Research In Motion Limited Unknown
SurfControl plc Unknown
Tivoli Systems Unknown
Trend Micro Unknown
The CERT/CC thanks Microsoft for the information provided in their advisory and NGSSoftware for their discovery and analysis of this vulnerability.
This document was written by Jeffrey P. Lanza.