📄 3150.txt
字号:
Rule:--Sid:3150--Summary:This event is generated when an attempt is made to exploit avulnerability in Microsoft Windows SQL Server.--Impact:Serious. Code execution is possible leading to unauthorizedadministrative access to the target host. Denial of Service (DoS) isalso possible.--Detailed Information:Microsoft Windows SQL Server 2000 uses the SQLXML component to processdatabase queries via XML.Due to a programming error a buffer overrun condition is present in theSQLXML ISAPI component that processes the XML queries via HTTP. Theoverrun condition can be exploited by manipulating the contenttypevariable used to control the Content-Type header. The ISAPI extensiondoes not correctly check the length of the contenttype parameter. It maybe possible for an attacker with user privileges on the target host toexploit the condition by supplying extra data in the affected parameter.--Affected Systems: Microsoft SQL Server 2000--Attack Scenarios:An attacker can overflow a buffer by inserting extra data into thecontenttype parameter of a malicious XML query. The attacker may theninsert code of their choosing to either run commands on the system orexecute the code with the privileges of the administrative account.--Ease of Attack:Simple.--False Positives:None known.--False Negatives:None known.--Corrective Action:Ensure the system is using an up to date version of the software and hashad all vendor supplied patches applied.--Contributors:Sourcefire Vulnerability Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>--Additional References:--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -