{"vuid":"VU#918652","idnumber":"918652","name":"Microsoft SQL Server becomes unresponsive when large packet is sent to specific named pipe","keywords":["Microsoft","SQL Server","DoS","denial of service","large packet","named pipe","Q815495","MS03-031"],"overview":"A vulnerability in Microsoft SQL Server may allow a local attacker to cause a denial of service. An exploit for this vulnerability is publicly available.","clean_desc":"Microsoft describes SQL Server as, \"a fully enterprise-class database product, providing core support for Extensible Markup Language (XML) and Internet queries.\" A vulnerability exists a portion of code responsible for supporting SQL queries over a named pipe. Quoting from Microsoft Security Bulletin MS03-031: \"The vulnerability results because of a flaw in the way that SQL Server interprets a return code from a specific named pipes operation. When more data than expected is received, SQL misinterprets the valid return code as an error. When this occurs, the system stops responding.\" The following products are affected: Microsoft SQL Server 7.0 \nMicrosoft Data Engine (MSDE) 1.0 \nMicrosoft SQL Server 2000 \nMicrosoft SQL Server 2000 Desktop Engine (MSDE 2000) \nMicrosoft SQL Server 2000 Desktop Engine (Windows) \nFor further technical details, please see the following documents: Microsoft Security Bulletin MS03-031\n@stake Security Advisory a072303-2","impact":"A local attacker may be able to cause the SQL Server to become unresponsive, which may require the host to be rebooted to regain functionality.","resolution":"Apply a patch.","workarounds":"","sysaffected":"","thanks":"This vulnerability was discovered by Andreas Junestam of @stake Inc.","author":"This document was written by Ian A Finlay.","public":["http://www.microsoft.com/security/security_bulletins/ms03-031.asp","http://www.microsoft.com/technet/security/bulletin/MS03-031.asp","http://www.atstake.com/research/advisories/2003/a072303-2.txt","http://www.microsoft.com/sql/evaluation/overview/default.asp","http://www.microsoft.com/sql/"],"cveids":["CVE-2003-0231"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2003-07-24T12:41:52Z","publicdate":"2003-07-23T00:00:00Z","datefirstpublished":"2003-07-28T14:41:56Z","dateupdated":"2003-07-29T13:20:36Z","revision":12,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"17","cam_population":"15","cam_impact":"8","cam_easeofexploitation":"10","cam_attackeraccessrequired":"15","cam_scorecurrent":"12.4875","cam_scorecurrentwidelyknown":"12.4875","cam_scorecurrentwidelyknownexploited":"19.2375","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":12.4875,"vulnote":null}