-----BEGIN PGP SIGNED MESSAGE-----

===========================================================================
             AUSCERT External Security Bulletin Redistribution

           ESB-2002.364 -- Microsoft Security Bulletin MS02-039
          Buffer Overruns in SQL Server 2000 Resolution Service
                 Could Enable Code Execution (Q323875)
                               25 July 2002

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:                SQL Server 2000
Vendor:                 Microsoft
Operating System:       Windows
Impact:                 Execute Arbitrary Code/Commands
                        Denial of Service
Access Required:        Remote

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----

- - ----------------------------------------------------------------------
Title:      Buffer Overruns in SQL Server 2000 Resolution Service 
            Could Enable Code Execution (Q323875)
Date:       24 July 2002 
Software:   SQL Server 2000
Impact:     Three vulnerabilities, the most serious of which could
            enable an attacker to gain control over an affected 
            SQL Server 2000 installation
Max Risk:   Critical
Bulletin:   MS02-039

Microsoft encourages customers to review the Security Bulletin at: 
http://www.microsoft.com/technet/security/bulletin/MS02-039.asp.
- - ----------------------------------------------------------------------

Issue:
======
SQL Server 2000 introduces the ability to host multiple instances of
SQL Server on a single physical machine. Each instance operates for
all intents and purposes as though it was a separate server. However,
the multiple instances cannot all use the standard SQL Server session
port (TCP 1433). While the default instance listens on TCP port 1433,
named instances listen on any port assigned to them. The SQL Server
Resolution Service, which operates on UDP port 1434, provides a way
for clients to query for the appropriate network endpoints to use for
a particular SQL Server instance. 

There are three security vulnerabilities here. The first two are
buffer overruns. By sending a carefully crafted packet to the
Resolution Service, an attacker could cause portions of system memory
(the heap in one case, the stack in the other) to be overwritten.
Overwriting it with random data would likely result in the failure of
the SQL Server service; overwriting it with carefully selected data
could allow the attacker to run code in the security context of the
SQL Server service. 

The third vulnerability is a denial of service vulnerability. SQL
uses a keep-alive mechanism to distinguish between active and passive
instances. It is possible to create a keep-alive packet that, when
sent to the Resolution Service, will cause SQL Server 2000 to respond
with the same information. An attacker who created such a packet,
spoofed the source address so that it appeared to come from a one SQL
Server 2000 system, and sent it to a neighboring SQL Server 2000
system could cause the two systems to enter a never-ending cycle of
keep-alive packet exchanges. This would consume resources on both
systems, slowing performance considerably. 

Mitigating Factors:
====================
Buffer Overruns in SQL Server Resolution Service: 
 - SQL Server 2000 runs in a security context chosen by the
   administrator at installation time. By default, it runs as
   a Domain User. Thus, although the attacker's code could take
   any desired action on the database, it would not necessarily
   have significant privileges at the operating system level if
   best practices have been followed. 
 - The risk posed by the vulnerability could be mitigated by, 
   if feasible, blocking port 1434 at the firewall. 

Denial of Service via SQL Server Resolution Service: 
 - An attack could be broken off by restarting the SQL Server 
   2000 service on either of the affected systems. Normal 
   processing on both systems would resume once the attack ceased. 
 - The vulnerability provides no way to gain any privileges on the
   system. It is a denial of service vulnerability only.

Maximum Risk Rating:
============
 - Internet systems: Critical
 - Intranet systems: Critical
 - Client systems: None

Patch Availability:
===================
 - A patch is available to fix this vulnerability. Please read the 
   Security Bulletin at
   http://www.microsoft.com/technet/security/bulletin/ms02-039.asp
   for information on obtaining this patch.

Acknowledgment:
===============
 - David Litchfield of Next Generation Security Software Ltd.
   (http://www.nextgenss.com/)
- - ---------------------------------------------------------------------

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED
"AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL
WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT
SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY
DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL,
CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF
MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION
OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO
THE FOREGOING LIMITATION MAY NOT APPLY.

- -----BEGIN PGP SIGNATURE-----
Version: PGP 7.1

iQEVAwUBPT810I0ZSRQxA/UrAQHfeggAl7tzuykuTyoNZy2FMvMVcs+5e6PqijaG
IB3rDbN0y3O+YLitDD7EGUVWNmRjfcFnZsAELmRwTtVNWXCKnhEuW6hNBIHa4x9V
U7KXsnv4aasoUX0477x7EekyTFhLCqit1vHKb46mAr4LhYdqbDF3qWwPhmPgiJWk
BV4QR78fdpKFx6RkKof5wMDBG9AFMC1UlD0jEP1LsTeOXkCUL3XEfWjCYnQ+bd2x
/NKN4tAszJC/NW0Lq9L7HkPkCUDYRpXLwLmj4qxym+LQiFdVFUgUh/AAI/8j9hUX
bPCLvizUwTDnJiZZTo2L4louG1XaEiAJSGJru2eVVEX0EtUgICfKJQ==
=6ANq
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content.  The decision to use any or all of this information is
the responsibility of each user or organisation, and should be done so in
accordance with site policies and procedures.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the original authors to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

	http://www.auscert.org.au/Information/advisories.html

If you believe that your system has been compromised, contact AusCERT or
your representative in FIRST (Forum of Incident Response and Security
Teams).

Internet Email: auscert@auscert.org.au
Facsimile:	(07) 3365 7031
Telephone:	(07) 3365 4417 (International: +61 7 3365 4417)
		AusCERT personnel answer during Queensland business hours
		which are GMT+10:00 (AEST).
		On call after hours for member emergencies.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key

iQCVAwUBPUAh+yh9+71yA2DNAQFaAQP9EouXwBw009GkMfx61T7XCB6pcVfbA/H9
qnrduvltj3OAWGlOV+ufigJp7N2+w9LQCIJZQ8SFhcZ3en7NzDMxig8mkc0zdPJp
5Xv0RYoUkuQoZACGJT5OBEY6vP19aygmxAU+5VoWgcJv2mZig3A8CeXyW4IHWwab
Ws9ruPdkXnU=
=i4Hw
-----END PGP SIGNATURE-----