Lucene search

K
certCERTVU:338195
HistoryJul 27, 2002 - 12:00 a.m.

Microsoft SQL Server installation process leaves sensitive information on system

2002-07-2700:00:00
www.kb.cert.org
14

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.001

Percentile

25.8%

Overview

Microsoft SQL server versions 7.0 and 2000, as well as MSDE 1.0, may leave installation and log files on the server after the installation process is complete. These files may contain senstitive information such as passwords [used during the install]. Users with authenticated access to the server may be able to view this information and gain elevated privileges.

Description

Microsoft SQL server versions 7.0 and 2000, as well as MSDE 1.0, may leave installation and log files on the server that contain passwords, after the installation process is complete. Users that can authenticate to the server, or read files stored locally on the server may be able to view this information and gain elevated privileges.

Note that while Microsoft SQL server versions 7.0 with SP 4 installed, and 2000 with SP 1 and 2 installed, encrypt the passwords prior to storing them in the temporary files, Microsoft’s security bulletin (MS02-035) states that the encryption used is “fairly weak” and could be subject to “password cracking attacks.”


Impact

Local authenticated users of the server may be able to view sensitive information such as passwords and gain elevated privileges.


Solution

Use the “KillPwd” utility provided in Microsoft’s security bulletin MS02-035 and apply the relevent patches.


Delete the installation log files and the “setup.iss” file after installation.


Vendor Information

338195

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Microsoft Corporation __ Affected

Updated: July 26, 2002

Status

Affected

Vendor Statement

See <http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS02-035.asp&gt;.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23338195 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported to Microsoft by Cesar Cerrudo.

This document was written by Jason A Rafail.

Other Information

CVE IDs: CVE-2002-0643
Severity Metric: 6.30 Date Public:

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.001

Percentile

25.8%

Related for VU:338195