Page 3 of 22 results (0.013 seconds)

CVSS: 10.0EPSS: 6%CPEs: 10EXPL: 1

Microsoft SQL Server 7.0 and 2000 installs with weak permissions for extended stored procedures that are associated with helper functions, which could allow unprivileged users, and possibly remote attackers, to run stored procedures with administrator privileges via (1) xp_execresultset, (2) xp_printstatements, or (3) xp_displayparamstmt. Microsoft SQL Server 7.0 y 2000 se instala con permisos débiles para ciertos procedimientos almacenados (stored procedures) extendidos que están asociados con funciones de ayuda, lo que podría permitir a usuairos sin privilegios, y posiblemente atacantes remotos, ejecutar procedimentos almacenados con privilegios de administrador. • https://www.exploit-db.com/exploits/21718 http://archives.neohapsis.com/archives/ntbugtraq/2002-q3/0087.html http://marc.info/?l=bugtraq&m=102950473002959&w=2 http://marc.info/?l=ntbugtraq&m=102950792606475&w=2 http://www.kb.cert.org/vuls/id/399531 http://www.kb.cert.org/vuls/id/818939 http://www.kb.cert.org/vuls/id/939675 http://www.ngssoftware.com/advisories/mssql-esppu.txt https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-043 •

CVSS: 10.0EPSS: 95%CPEs: 10EXPL: 2

The "sa" account is installed with a default null password on (1) Microsoft SQL Server 2000, (2) SQL Server 7.0, and (3) Data Engine (MSDE) 1.0, including third party packages that use these products such as (4) Tumbleweed Secure Mail (MMS) (5) Compaq Insight Manager, and (6) Visio 2000, which allows remote attackers to gain privileges, as exploited by worms such as Voyager Alpha Force and Spida. • https://www.exploit-db.com/exploits/16395 https://www.exploit-db.com/exploits/16394 http://marc.info/?l=bugtraq&m=96333895000350&w=2 http://marc.info/?l=bugtraq&m=96593218804850&w=2 http://marc.info/?l=bugtraq&m=96644570412692&w=2 http://online.securityfocus.com/archive/1/273639 http://security-archive.merton.ox.ac.uk/bugtraq-200008/0233.html http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ313418 http://support.microsoft.com/default.aspx? •

CVSS: 4.6EPSS: 0%CPEs: 8EXPL: 0

The installation of Microsoft Data Engine 1.0 (MSDE 1.0), and Microsoft SQL Server 2000 creates setup.iss files with insecure permissions and does not delete them after installation, which allows local users to obtain sensitive data, including weakly encrypted passwords, to gain privileges, aka "SQL Server Installation Process May Leave Passwords on System." La instalación de Microsoft Data Engine 1.0 (MSDE 1.0), y Microsoft SQL Server 2000 crea ficheros setup.iss con permisos inseguros que no son eliminados después de la instalación, lo cual posibilita a usuarios locales la obtención de datos confidenciales, incluyendo contraseñas débilmente encriptadas, para obtener privilegios. Esta vulnerabilidad también es conocida como SQL Server Installation Process May Leave Passwords on System. • http://marc.info/?l=bugtraq&m=102640092826731&w=2 http://marc.info/?l=vuln-dev&m=102640394131103&w=2 http://www.kb.cert.org/vuls/id/338195 http://www.securityfocus.com/bid/5203 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-035 •

CVSS: 4.6EPSS: 0%CPEs: 4EXPL: 2

The xp_displayparamstmt function in SQL Server and Microsoft SQL Server Desktop Engine (MSDE) does not properly restrict the length of a buffer before calling the srv_paraminfo function in the SQL Server API for Extended Stored Procedures (XP), which allows an attacker to cause a denial of service or execute arbitrary commands, aka the "Extended Stored Procedure Parameter Parsing" vulnerability. • https://www.exploit-db.com/exploits/20451 http://marc.info/?l=bugtraq&m=97570878710037&w=2 http://www.securityfocus.com/bid/2030 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-092 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A231 •

CVSS: 4.6EPSS: 37%CPEs: 4EXPL: 1

The xp_printstatements function in Microsoft SQL Server 2000 and SQL Server Desktop Engine (MSDE) does not properly restrict the length of a buffer before calling the srv_paraminfo function in the SQL Server API for Extended Stored Procedures (XP), which allows an attacker to cause a denial of service or execute arbitrary commands, aka the "Extended Stored Procedure Parameter Parsing" vulnerability. • http://marc.info/?l=bugtraq&m=97570884410184&w=2 http://www.securityfocus.com/bid/2041 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-092 •