Microsoft warns of critical bug in SQL Server

Released attack code targets SQL Server database software

Microsoft Monday warned customers that attack code has been released targeting a critical vulnerability in older versions of its widely-used SQL Server database software, and urged users to apply a temporary workaround.

The bug was first reported to Microsoft last April by an Austrian security consulting company, SEC Consult. But the firm apparently grew tired of waiting for Microsoft to decide when or whether it would release a patch, disclosed the flaw two weeks ago and published proof-of-concept exploit code.

According to SEC Consult, Microsoft has had a patch ready for nearly three months, but has declined to release it.

In a security advisory issued late Monday, Microsoft said that systems running SQL Server 2000, SQL Server 2005, SQL Server 2005 Express Edition, SQL Server 2000 Desktop Engine (MSDE 2000), Microsoft SQL Server 2000 Desktop Engine (WMSDE) and Windows Internal Database (WYukon) can be exploited, then hijacked by hackers.

The bug is in the "sp_replwritetovarbin" SQL Server extended stored procedure.

Newer versions of the popular software, which is used by many Web sites to power their back-end databases, are immune from attack, however. Those versions include SQL Server 7.0 Service Pack 4 (SP4), SQL Server 2005 SP3 and SQL Server 2008. That last version, the newest in the line, was released to manufacturing just last August.

As it often does, Microsoft downplayed the threat even as it issued the advisory. "We are aware that exploit code has been published on the Internet," said a company spokesman, in an e-mail Monday. "However, we are not aware of any attacks attempting to use the reported vulnerability."

Attackers can exploit the bug remotely if they are able to gain access to the server through a SQL injection attack against a vulnerable Web application running on the system, Sisk acknowledged.

Successful SQL injection attacks are hardly rare; hackers have managed to compromise huge numbers of sites, even prominent commercial domains, using such attacks. Several thousand legitimate sites, for example, were hacked via SQL injection attacks in the last few weeks by criminals who then planted rogue code on their pages and attacked visitors running Internet Explorer (IE). Microsoft plugged the IE hole last Wednesday with the second emergency patch in a two-month span.

Microsoft said that denying permissions to the "'sp_replwritetovarbin" extended stored procedure would protect vulnerable systems, and provided instructions on how to do that in the advisory.

Sisk didn't commit the company to a fix, or a timeline for one, but the boilerplate phrasing he used — "Microsoft will continue to investigate this vulnerability and upon completion of this investigation, will take the appropriate actions" — typically leads at some point to a patch.

SEC Consult, however, claimed Microsoft completed a fix in September.

The company, which is headquartered in Vienna, went public with the vulnerability on Dec. 9 by publishing information and sample attack code in an advisory on its site, as well as to several security mailing lists, including Bugtraq and Full Disclosure .

In its disclosure, SEC Consult said it had been told by Microsoft in a September e-mail that a patch was finished. "The release schedule for this fix is currently unknown," SEC Consult's advisory read.

The Austrian security firm also included a timeline it said reflected the communications between it and Microsoft. According to that timetable, SEC Consult reported the vulnerability to Microsoft on April 17, 2008, and last heard back from Microsoft Sept 29. Four times since then — on Oct. 14, Oct. 29, Nov. 12 and Nov. 28 — SEC Consult asked Microsoft for an update on the patch release status, but received no reply.

Microsoft did not immediately respond to questions about SEC Consult's claims, including patch availability and the timeline.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.
Gregg Keizer

Gregg Keizer

Computerworld (US)
Show Comments

Brand Post

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Luke Hill

MSI GT75 TITAN

I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Emily Tyson

MSI GE63 Raider

If you’re looking to invest in your next work horse laptop for work or home use, you can’t go wrong with the MSI GE63.

Laura Johnston

MSI GS65 Stealth Thin

If you can afford the price tag, it is well worth the money. It out performs any other laptop I have tried for gaming, and the transportable design and incredible display also make it ideal for work.

Andrew Teoh

Brother MFC-L9570CDW Multifunction Printer

Touch screen visibility and operation was great and easy to navigate. Each menu and sub-menu was in an understandable order and category

Louise Coady

Brother MFC-L9570CDW Multifunction Printer

The printer was convenient, produced clear and vibrant images and was very easy to use

Edwina Hargreaves

WD My Cloud Home

I would recommend this device for families and small businesses who want one safe place to store all their important digital content and a way to easily share it with friends, family, business partners, or customers.

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?