{"vuid":"VU#338195","idnumber":"338195","name":"Microsoft SQL Server installation process leaves sensitive information on system","keywords":["Microsoft","SQL Server","installation process","sensitive information","password","setup.iss","weak encryption","plain text","Q263968","MS02-035"],"overview":"Microsoft SQL server versions 7.0 and 2000, as well as MSDE 1.0, may leave installation and log files on the server after the installation process is complete. These files may contain senstitive information such as passwords [used during the install]. Users with authenticated access to the server may be able to view this information and gain elevated privileges.","clean_desc":"Microsoft SQL server versions 7.0 and 2000, as well as MSDE 1.0, may leave installation and log files on the server that contain passwords, after the installation process is complete. Users that can authenticate to the server, or read files stored locally on the server may be able to view this information and gain elevated privileges. Note that while Microsoft SQL server versions 7.0 with SP 4 installed, and 2000 with SP 1 and 2 installed, encrypt the passwords prior to storing them in the temporary files, Microsoft's security bulletin (MS02-035) states that the encryption used is \"fairly weak\" and could be subject to \"password cracking attacks.\"","impact":"Local authenticated users of the server may be able to view sensitive information such as passwords and gain elevated privileges.","resolution":"Use the \"KillPwd\" utility provided in Microsoft's security bulletin MS02-035 and apply the relevent patches.","workarounds":"Delete the installation log files and the \"setup.iss\" file after installation.","sysaffected":"","thanks":"This vulnerability was reported to Microsoft by Cesar Cerrudo.","author":"This document was written by Jason A Rafail.","public":["http://www.microsoft.com/technet/security/bulletin/MS02-035.asp","http://www.microsoft.com/technet/security/bulletin/MS00-035.asp","http://msdn.microsoft.com/library/default.asp?URL=/library/techart/acaccessprojects.htm","http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnmsde/html/msdeforvs.asp","http://www.appsecinc.com/resources/alerts/mssql/02-0009.html","http://www.securityfocus.com/bid/5203"],"cveids":["CVE-2002-0643"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2002-07-11T19:17:56Z","publicdate":"2002-07-10T00:00:00Z","datefirstpublished":"2002-07-27T01:24:57Z","dateupdated":"2002-07-31T17:42:09Z","revision":14,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"18","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"15","cam_impact":"4","cam_easeofexploitation":"20","cam_attackeraccessrequired":"10","cam_scorecurrent":"6.3","cam_scorecurrentwidelyknown":"6.75","cam_scorecurrentwidelyknownexploited":"11.25","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":6.3,"vulnote":null}