Check Point Advisories

Preemptive Protection against Microsoft SQL Server sp_replwritetovarbin Limited Memory Overwrite Vulnerability (MS09-004)

Check Point Reference: CPAI-2009-008
Date Published: 10 Feb 2009
Severity: High
Last Updated: Friday 13 February, 2009
Source: Microsoft Security Bulletin MS09-004
Industry Reference:CVE-2008-5416
Protection Provided by:
Who is Vulnerable? SQL Server 2000 SP4
SQL Server 2000 (Itanium) SP4
SQL Server 2005 SP1
SQL Server 2005 SP2
SQL Server 2005 x64 Edition SP1
SQL Server 2005 x64 Edition SP2
SQL Server 2005 with SP1 (Itanium)
SQL Server 2005 with SP2 (Itanium)
Microsoft SQL Server 2000 Desktop Engine (MSDE 2000) SP4
Microsoft SQL Server 2005 Express Edition SP1
Microsoft SQL Server 2005 Express Edition SP2
Microsoft SQL Server 2005 Express Edition with Advanced Services SP1
Microsoft SQL Server 2005 Express Edition with Advanced Services SP2
Microsoft SQL Server 2000 Desktop Engine (WMSDE)
Windows Internal Database (WYukon) SP2
Vulnerability Description A remote code execution vulnerability has been reported in Microsoft SQL Server. Microsoft SQL Server is a relational database management system (RDBMS). The flaw is in the way that SQL Server checks parameters in the "sp_replwritetovarbin" extended stored procedure. By sending a specially crafted SQL script to a target server, a remote attacker may trigger this vulnerability to execute arbitrary code on the affected system.
Update/Patch AvaliableApply patches:
Microsoft Security Bulletin MS09-004
Vulnerability DetailsThe vulnerability in the MSSQL extended stored procedure, "sp_replwritetovarbin," is due to an invalid parameter check. To exploit this issue, an attacker may create a query that calls the vulnerable extended stored procedure with an invalid parameter. Successful exploitation may allow the attacker to take complete control of an affected system.

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK