7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.034 Low
EPSS
Percentile
91.3%
The Microsoft SQL Server contains a buffer overflow vulnerability that may allow remote attackers to execute arbitrary code with system privileges.
The Microsoft SQL Server contains a buffer overflow vulnerability in the code used to process “Bulk Insert” queries. Bulk Insert queries allow the SQL user to supply a file containing records to be imported into the SQL database. If an attacker supplies a file with an excessively long filename, it is possible to overflow the application stack and alter the flow of execution, resulting in the execution of arbitrary code. Note that successful exploitation of this vulnerability requires Bulk Administrator or Administrator group privileges.
This vulnerability may allow remote attackers to execute arbitrary code with system privileges.
Apply a patch
Microsoft has published Security Bulletin MS02-034 to address this vulnerability. For more information, please see
http://www.microsoft.com/technet/security/bulletin/MS02-034.asp
This vulnerability also affects any products that include the Microsoft Desktop Engine (MSDE) 2000. For more information, please see
http://www.microsoft.com/technet/security/MSDEapps.asp
682620
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: July 11, 2002 Updated: July 12, 2002
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Microsoft has published Security Bulletin MS02-034 to address this vulnerability. For more information, please see
http://www.microsoft.com/technet/security/bulletin/MS02-034.asp
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23682620 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
The CERT/CC thanks NGSSoftware for their discovery and analysis of this vulnerability.
This document was written by Jeffrey P. Lanza and is based upon information provided by Microsoft and NGSSoftware.
CVE IDs: | CVE-2002-0641 |
---|---|
Severity Metric: | 5.91 Date Public: |
online.securityfocus.com/bid/4847/info/
support.microsoft.com/support/misc/kblookup.asp?id=Q316333
www.microsoft.com/technet/prodtechnol/sql/maintain/security/sql2ksec.asp
www.microsoft.com/technet/security/bulletin/MS02-034.asp
www.nextgenss.com/advisories/ms-sqlbi.txt
www.ngssoftware.com/vna/ms-sql.txt