[VulnWatch] Microsoft SQL Server Extended Stored Procdure privilege upgrade vulnerabilities (#NISR15002002A)

From: David Litchfield (davidat_private)
Date: Thu Aug 15 2002 - 20:11:16 PDT

  • Next message: David Litchfield: "[VulnWatch] Microsoft SQL Server Agent Jobs Vulnerabilities (#NISR15002002B)"

    NGSSoftware Insight Security Research Advisory
    
    Name: Extended Stored Procedure Privilege Upgrade
    Systems: Microsoft SQL Server 2000 and 7
    Severity: High Risk
    Category: Privilege Escalation
    Vendor URL: http://www.microsoft.com/
    Author: David Litchfield (davidat_private)
    Advisory URL: http://www.ngssoftware.com/advisories/mssql-esppu.txt
    Date: 15th August 2002
    Advisory number: #NISR15002002A
    
    
    Description
    ***********
    Microsoft SQL Server 2000 and 7 extends functionality by using extended
    stored procedures. Three particular extended stored procedures contain a
    vulnerability that allow a low privileged user to run abritrary SQL queries
    in the context of the
    account running SQL Server.
    
    Details
    *******
    SQL Server supports two forms of authentication. The first is where a user
    uses an SQL login and password to authenticate and the second is through
    Windows Authentication. Any user authenticated by Windows can "upgrade"
    their privileges to that of the account running the SQL Server by using one
    of three extended stored procedures. These stored procedures allow a user to
    run an arbitrary SQL query. By exploiting this problem a low privileged user
    will be able to run any stored procedure, extended or otherwise, and select
    from, update or insert into any table in any database. That is by exploiting
    these holes an attacker can fully compromise the database server and its
    data. Whilst an SQL Login user can not directly exploit this vulnerability
    they can do so indirectly by submitting a job to the SQL Agent. As this the
    SQL Agent authenticates to the SQL Server and runs in the context of Windows
    account these vulnerabilities can be exploited. Please see NGSSoftware alert
    NISR15002002A (http://www.ngssoftware.com/advisories/mssql-esppu.txt) for
    more details.
    
    Fix Information
    ***************
    NGSSoftware informed Microsoft of these issues in July. Microsoft has
    produced a patch that resolves these issues. Please see
    
    http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/
    bulletin/MS02-043.asp
    
    for more details.
    
    For those SQL Server database administrators who are not able to patch
    immediately NGSSoftware recommend that they remove public access to these
    stored procedures. This will prevent low privileged users from accessing
    these extended stored procedures.
    
    xp_execresultset
    xp_printstatements
    xp_displayparamstmt
    
    A check for this vulnerability has been added to Typhon II, NGSSoftware's
    vulnerability assessment scanner, of which, more information is available
    from the NGSSite, http://www.ngssoftware.com/.
    



    This archive was generated by hypermail 2b30 : Thu Aug 15 2002 - 20:49:16 PDT