Re: Microsoft SQL Server Agent Jobs Vulnerabilities (#NISR15002002B)

From: Chip Andrews (chipat_private)
Date: Mon Aug 26 2002 - 12:26:30 PDT

  • Next message: securityat_private: "Security Update: [CSSA-2002-SCO.38] Open UNIX 8.0.0 UnixWare 7.1.1 : X server insecure popen and buffer overflow"

    I'm not sure how you can categorize this as "human error" since the default
    SQL Server installation includes the 'guest' user in master, msdb, and
    tempdb databases.  This gives all logins, no matter how lowly, access to
    thoses databases and objects inside that have permissions granted to the
    'public' role.  I think you'll find MS has been most gracious with those
    permissions.  That, and the aforementioned buffer overflows, are the crux of
    the problem.
    
    Chip Andrews
    www.sqlsecurity.com
    
    ----- Original Message -----
    From: "Brent Glover" <brent.gloverat_private>
    To: <bugtraqat_private>
    Sent: Sunday, August 25, 2002 5:01 PM
    Subject: Re: Microsoft SQL Server Agent Jobs Vulnerabilities
    (#NISR15002002B)
    
    
    > In-Reply-To: <015601c244d2$fa6f8a30$2500a8c0@HEPHAESTUS>
    >
    > IMHO - This is more a human error driven feature than a high risk
    > vulnerability.
    >
    > Whilst what David says is true - the assumption has been made that a login
    > has access to the "msdb" database by default - this assumption is
    > incorrect.
    >
    > The only way this vulnerability can be exploited is if a DBA (mad of
    > course ;-)) has given access for a login account to the "msdb" database.
    >
    > Brent Glover
    > Database specialist
    >
    >
    



    This archive was generated by hypermail 2b30 : Tue Aug 27 2002 - 10:58:33 PDT