-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.1371
Vulnerabilities in SQL Server Could Allow Elevation of Privilege (2984340)
                              13 August 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Microsoft SQL Server
Publisher:         Microsoft
Operating System:  Windows
Impact/Access:     Denial of Service    -- Remote/Unauthenticated      
                   Cross-site Scripting -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-4061 CVE-2014-1820 

Original Bulletin: 
   https://technet.microsoft.com/library/security/ms14-044

- --------------------------BEGIN INCLUDED TEXT--------------------

Microsoft Security Bulletin MS14-044 - Important
Vulnerabilities in SQL Server Could Allow Elevation of Privilege (2984340)

Published: August 12, 2014

Version: 1.0

This security update resolves two privately reported vulnerabilities in 
Microsoft SQL Server (one in SQL Server Master Data Services and the other in
the SQL Server relational database management system). The more severe of 
these vulnerabilities, affecting SQL Server Master Data Services, could allow
elevation of privilege if a user visits a specially crafted website that 
injects a client-side script into the user's instance of Internet Explorer. In
all cases, an attacker would have no way to force users to view the 
attacker-controlled content. Instead, an attacker would have to convince users
to take action, typically by getting them to click a link in an email message
or in an Instant Messenger message that takes them to the attacker's website,
or by getting them to open an attachment sent through email.

This security update is rated Important for supported editions of Microsoft 
SQL Server 2008 Service Pack 3, Microsoft SQL Server 2008 R2 Service Pack 2, 
and Microsoft SQL Server 2012 Service Pack 1; it is also rated Important for 
Microsoft SQL Server 2014 for x64-based Systems.

Affected Software

SQL Server 2008

SQL Server 2008 R2

SQL Server 2012

SQL Server 2014

Vulnerability Information

SQL Master Data Services XSS Vulnerability - CVE-2014-1820

An XSS vulnerability exists in SQL Master Data Services (MDS) that could allow
an attacker to inject a client-side script into the user's instance of 
Internet Explorer. The script could spoof content, disclose information, or 
take any action that the user could take on the site on behalf of the targeted
user. To view this vulnerability as a standard entry in the Common 
Vulnerabilities and Exposures list, see CVE-2014-1820.

Microsoft SQL Server Stack Overrun Vulnerability - CVE-2014-4061

A denial of service vulnerability exists in SQL Server. An attacker who 
successfully exploited this vulnerability could cause the server to stop 
responding until a manual reboot is initiated To view this vulnerability as a
standard entry in the Common Vulnerabilities and Exposures list, see 
CVE-2014-4061.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=M/9S
-----END PGP SIGNATURE-----