Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2014.1371 Vulnerabilities in SQL Server Could Allow Elevation of Privilege (2984340) 13 August 2014 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Microsoft SQL Server Publisher: Microsoft Operating System: Windows Impact/Access: Denial of Service -- Remote/Unauthenticated Cross-site Scripting -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2014-4061 CVE-2014-1820 Original Bulletin: https://technet.microsoft.com/library/security/ms14-044 - --------------------------BEGIN INCLUDED TEXT-------------------- Microsoft Security Bulletin MS14-044 - Important Vulnerabilities in SQL Server Could Allow Elevation of Privilege (2984340) Published: August 12, 2014 Version: 1.0 This security update resolves two privately reported vulnerabilities in Microsoft SQL Server (one in SQL Server Master Data Services and the other in the SQL Server relational database management system). The more severe of these vulnerabilities, affecting SQL Server Master Data Services, could allow elevation of privilege if a user visits a specially crafted website that injects a client-side script into the user's instance of Internet Explorer. In all cases, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website, or by getting them to open an attachment sent through email. This security update is rated Important for supported editions of Microsoft SQL Server 2008 Service Pack 3, Microsoft SQL Server 2008 R2 Service Pack 2, and Microsoft SQL Server 2012 Service Pack 1; it is also rated Important for Microsoft SQL Server 2014 for x64-based Systems. Affected Software SQL Server 2008 SQL Server 2008 R2 SQL Server 2012 SQL Server 2014 Vulnerability Information SQL Master Data Services XSS Vulnerability - CVE-2014-1820 An XSS vulnerability exists in SQL Master Data Services (MDS) that could allow an attacker to inject a client-side script into the user's instance of Internet Explorer. The script could spoof content, disclose information, or take any action that the user could take on the site on behalf of the targeted user. To view this vulnerability as a standard entry in the Common Vulnerabilities and Exposures list, see CVE-2014-1820. Microsoft SQL Server Stack Overrun Vulnerability - CVE-2014-4061 A denial of service vulnerability exists in SQL Server. An attacker who successfully exploited this vulnerability could cause the server to stop responding until a manual reboot is initiated To view this vulnerability as a standard entry in the Common Vulnerabilities and Exposures list, see CVE-2014-4061. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBU+qH4xLndAQH1ShLAQK+7w/5AU1syrxl8OHKkm0e2sWx8exPFxlWyP0J pFM8Y0qrx4e034lQklrjwasyO1ExXEw4YqKP1Rs8Xjuvfg7nkmj0uGA0oToX9reP d6cqpfcrcuYns6+kUhvXQ7ifQXPiFfBr/BIqTXpLXK5Raf2NWviyEHRbKbTBmV+N L7BlZLDteICMln+GXxF1CmV4W29j3hmGiREND/PCPt1ioPTLFWSqToRbNFaWakJh rMJstlxXN3KJV++DyCu60nQct0VhuTIq7VLLfCWSMQ1Zocv3v3TTIHBMre6fLVp9 ufOTWHreOJrodnZuli5n3GfGyPuOv4EN0JzUAFIY1qFsvl5aAJ8H8lDpL+AeZOih HaPZolY4czY65h/e82HUcb49aPgOyFnEYhvvYzbZ+hndCbsq84PKv+byamwdPmtU 8LsKQAfZi/kr/LfNga2NRMwnfQ3HKhCmZ63bb2IkwFUX4DbrMSqC5u/1nKXqBr+N YbbG8fbj/D7tQr4ZG4cVrZ7PoBaIRgEgBf3yaU1mGupx5ktMSSvRqy90D74TIKzY PoKNX9BGbHAYeOfkTHRqgomoOqZOdZ14YGKeTkeDF6WzoWQRmmATie3sD/KOaBq4 LvYLjyz+qgXdp6q0wbaTjETdsWBOEx27Ur0HDBUZQe3l1l1YIAivG2F/n0umdolI kxqIZy87Sbk= =M/9S -----END PGP SIGNATURE-----