{"vuid":"VU#279323","idnumber":"279323","name":"Microsoft SQL Server contains buffer overflows in several Database Consistency Checkers","keywords":["Microsoft","SQL Server","Microsoft Data Engine","MSDE","buffer overflow","Database Consistency Checkers","DBCC","Q316333","MS02-038"],"overview":"Microsoft SQL Server ships with several administrative tools that allow database users to elevate their administrative privileges from a single database to all databases on the server.","clean_desc":"Microsoft SQL Server ships with several utilities known as Database Consistency Checkers (DBCCs). According to Microsoft Security Bulletin MS02-038, \"DBCCs are command console utilities that allow maintenance and other operations to be performed on a SQL server.\"  An unspecified subset of the DBCC utilities contain buffer overflows that allow users who have db_owner or db_ddladmin privileges on a single database to elevate their administrative privileges to the entire SQL server.","impact":"This vulnerability allows remote attackers to execute arbitrary code with the privileges of the SQL service account. If the privileges of the service account are elevated via VU#796313, this vulnerability may result in compromise of the server host.","resolution":"Apply a patch Microsoft has published Security Bulletin MS02-038 to address this vulnerability. For more information, please see http://www.microsoft.com/technet/security/bulletin/ms02-038.asp This vulnerability also affects any products that include the Microsoft Desktop Engine (MSDE) 2000. For more information, please see http://www.microsoft.com/technet/security/MSDEapps.asp","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported to Microsoft by Cesar Cerrudo.","author":"This document was written by Jeffrey P. Lanza and is based upon information provided by Microsoft.","public":["http://www.microsoft.com/technet/security/bulletin/ms02-038.asp","http://support.microsoft.com/support/misc/kblookup.asp?id=Q316333","http://www.microsoft.com/technet/prodtechnol/sql/maintain/security/sql2ksec.asp","http://online.securityfocus.com/bid/5307"],"cveids":["CVE-2001-0644"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2002-07-25T13:53:09Z","publicdate":"2002-07-24T00:00:00Z","datefirstpublished":"2002-07-25T22:48:29Z","dateupdated":"2003-02-06T21:04:36Z","revision":15,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"10","cam_internetinfrastructure":"10","cam_population":"15","cam_impact":"18","cam_easeofexploitation":"10","cam_attackeraccessrequired":"5","cam_scorecurrent":"8.859375","cam_scorecurrentwidelyknown":"10.125","cam_scorecurrentwidelyknownexploited":"12.65625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":8.859375,"vulnote":null}