Notified: February 13, 2003 Updated: February 20, 2003
Approximately 24 hours after the announcement of the vulnerability exploited by SQL Slammer (aka, Sapphire) in July, 2002, BindView provided it's customers with a tool for identifying vulnerable systems. BindView products have a requirement for customers to use either MSDE or SQL, which are vulnerable if unpatched. Guidance provided to customers at that time recommended immediate installation of the patches to correct the vulnerability. BindView re-issued both the tools and the guidance immediately after the initial outbreak of SQL Slammer. Technical Note: Where BindView products require MSDE or SQL installed, the patches published by Microsoft will support BindView installations. No additional special patches are required.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.